Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Uninstall.exe

Overview

General Information

Sample name:Uninstall.exe
Analysis ID:1528656
MD5:7904be8f714449e8d7d23d98d5942aef
SHA1:a5f579b308d08e595cb6b3601e7e354f157be33d
SHA256:c5e1df2580fa74e4caa8ff329d1e4b820093ef9d29433e644b227186beb6954a
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to create guard pages, often used to hinder reverse engineering and debugging
Contains functionality to dynamically determine API calls
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found dropped PE file which has not been started or loaded
Found evasive API chain checking for process token information
Found potential string decryption / allocating functions
Sample file is different than original file name gathered from version info
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • Uninstall.exe (PID: 7408 cmdline: "C:\Users\user\Desktop\Uninstall.exe" MD5: 7904BE8F714449E8D7D23D98D5942AEF)
    • Au_.exe (PID: 7432 cmdline: "C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\user\Desktop\ MD5: 7904BE8F714449E8D7D23D98D5942AEF)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: C:\Users\user\AppData\Local\Temp\nsf2165.tmp\NSISPlugin.dllVirustotal: Detection: 14%Perma Link
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeReversingLabs: Detection: 45%
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeVirustotal: Detection: 50%Perma Link
Source: Uninstall.exeReversingLabs: Detection: 45%
Source: Uninstall.exeVirustotal: Detection: 50%Perma Link
Source: Uninstall.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: Uninstall.exeStatic PE information: certificate valid
Source: Binary string: C:\CODE\vitruvian\client\Installers\Windows\NSISPlugin\Release\NSISPlugin.pdb source: Au_.exe, 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmp, Au_.exe, 00000001.00000002.2973586073.000000000299E000.00000004.00000020.00020000.00000000.sdmp, NSISPlugin.dll.1.dr, nsu2089.tmp.1.dr
Source: C:\Users\user\Desktop\Uninstall.exeCode function: 0_2_00405E61 FindFirstFileA,FindClose,0_2_00405E61
Source: C:\Users\user\Desktop\Uninstall.exeCode function: 0_2_0040263E FindFirstFileA,0_2_0040263E
Source: C:\Users\user\Desktop\Uninstall.exeCode function: 0_2_0040548B CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,0_2_0040548B
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: 1_2_00405E61 FindFirstFileA,FindClose,1_2_00405E61
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: 1_2_0040548B CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,1_2_0040548B
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: 1_2_0040263E FindFirstFileA,1_2_0040263E
Source: unknownDNS traffic detected: query: 18.31.95.13.in-addr.arpa replaycode: Name error (3)
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: 18.31.95.13.in-addr.arpa
Source: Uninstall.exe, Au_.exe.0.drString found in binary or memory: http://crl.globalsign.com/gs/gscodesigng2.crl0
Source: Uninstall.exe, Au_.exe.0.drString found in binary or memory: http://crl.globalsign.net/root.crl0
Source: Uninstall.exe, Au_.exe.0.drString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
Source: Au_.exe, Au_.exe, 00000001.00000002.2972607881.0000000000409000.00000004.00000001.01000000.00000004.sdmp, Au_.exe, 00000001.00000000.1721749700.0000000000409000.00000008.00000001.01000000.00000004.sdmp, Uninstall.exe, Au_.exe.0.drString found in binary or memory: http://nsis.sf.net/NSIS_Error
Source: Uninstall.exe, Au_.exe.0.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
Source: Uninstall.exe, Au_.exe.0.drString found in binary or memory: http://ocsp.thawte.com0
Source: Uninstall.exe, Au_.exe.0.drString found in binary or memory: http://ocsp2.globalsign.com/gscodesigng20
Source: Uninstall.exe, Au_.exe.0.drString found in binary or memory: http://secure.globalsign.com/cacert/gscodesigng2.crt04
Source: Uninstall.exe, Au_.exe.0.drString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
Source: Uninstall.exe, Au_.exe.0.drString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
Source: Uninstall.exe, Au_.exe.0.drString found in binary or memory: http://ts-ocsp.ws.symantec.com07
Source: Uninstall.exe, 00000000.00000002.1722365263.00000000005AE000.00000004.00000020.00020000.00000000.sdmp, Uninstall.exe, 00000000.00000002.1722642452.0000000002804000.00000004.00000020.00020000.00000000.sdmp, Au_.exe, 00000001.00000002.2973586073.000000000296D000.00000004.00000020.00020000.00000000.sdmp, Au_.exe, 00000001.00000002.2972921606.0000000000828000.00000004.00000020.00020000.00000000.sdmp, nsz1ED4.tmp.0.dr, nsu2089.tmp.1.drString found in binary or memory: http://www.linkwizapp.com/uninstall-success
Source: Uninstall.exe, 00000000.00000002.1722365263.00000000005AE000.00000004.00000020.00020000.00000000.sdmp, Uninstall.exe, 00000000.00000002.1722642452.0000000002804000.00000004.00000020.00020000.00000000.sdmp, Au_.exe, 00000001.00000002.2973586073.000000000296D000.00000004.00000020.00020000.00000000.sdmp, Au_.exe, 00000001.00000002.2972921606.0000000000828000.00000004.00000020.00020000.00000000.sdmp, nsz1ED4.tmp.0.dr, nsu2089.tmp.1.drString found in binary or memory: http://www.linkwizapp.com/uninstall-successrundll32.exeopenShellExecuteAsSessionUserWithFallback
Source: nsu2089.tmp.1.drString found in binary or memory: https://weld.unitegenius.com/i?e=vitruvian-installer-uninstall-v0002
Source: Uninstall.exe, Au_.exe.0.drString found in binary or memory: https://www.globalsign.com/repository/0
Source: Uninstall.exe, Au_.exe.0.drString found in binary or memory: https://www.globalsign.com/repository/03
Source: C:\Users\user\Desktop\Uninstall.exeCode function: 0_2_00405042 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00405042
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: 1_2_10001529 GetWindowLongA,lstrlenA,lstrlenA,lstrlenA,GlobalAlloc,wsprintfA,CreateProcessA,GetLastError,MultiByteToWideChar,MultiByteToWideChar,lstrlenA,MultiByteToWideChar,GetDlgItem,GetDlgItem,SendMessageW,SendMessageW,GetDlgItem,SendMessageW,CreateProcessWithLogonW,GetLastError,GetLastError,FormatMessageA,MessageBoxA,LocalFree,GetLastError,GlobalFree,CloseHandle,EndDialog,SetWindowLongA,GetDlgItem,GetDlgItem,SendMessageA,SendMessageA,GetDlgItem,SendMessageA,LoadLibraryA,LoadImageA,GetDlgItem,SendMessageA,SendMessageA,GetDlgItem,SendMessageA,GetDlgItem,SendMessageA,DestroyWindow,1_2_10001529
Source: C:\Users\user\Desktop\Uninstall.exeCode function: 0_2_0040323C EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,DeleteFileA,ExitProcess,CoUninitialize,ExitProcess,lstrcatA,lstrcmpiA,CreateDirectoryA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,0_2_0040323C
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: 1_2_0040323C EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcmpiA,CreateDirectoryA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,1_2_0040323C
Source: C:\Users\user\Desktop\Uninstall.exeCode function: 0_2_004048530_2_00404853
Source: C:\Users\user\Desktop\Uninstall.exeCode function: 0_2_004061310_2_00406131
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: 1_2_004048531_2_00404853
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: 1_2_004061311_2_00406131
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: 1_2_6E5C4ED21_2_6E5C4ED2
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: 1_2_6E5D4FD31_2_6E5D4FD3
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: 1_2_6E5D6FE71_2_6E5D6FE7
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: 1_2_6E5AAC871_2_6E5AAC87
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: 1_2_6E5D5CBF1_2_6E5D5CBF
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: 1_2_6E5C3D6C1_2_6E5C3D6C
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: 1_2_6E5D4A631_2_6E5D4A63
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: 1_2_6E5BFAF01_2_6E5BFAF0
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: 1_2_6E5CCA911_2_6E5CCA91
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: 1_2_6E5C39371_2_6E5C3937
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: 1_2_6E5D55431_2_6E5D5543
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: 1_2_6E5C351F1_2_6E5C351F
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: 1_2_6E5CB20C1_2_6E5CB20C
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: 1_2_6E5A83BA1_2_6E5A83BA
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: 1_2_6E5C302B1_2_6E5C302B
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: 1_2_6E5A31651_2_6E5A3165
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: 1_2_6E5C71AD1_2_6E5C71AD
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: 1_2_6E5C41A11_2_6E5C41A1
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: String function: 6E5C5E60 appears 48 times
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: String function: 6E5C12ED appears 69 times
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: String function: 6E5A165E appears 86 times
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: String function: 6E5A22ED appears 33 times
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: String function: 6E5C1320 appears 49 times
Source: Uninstall.exe, 00000000.00000000.1718651106.000000000052B000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamelinkwiz-setup.exe2 vs Uninstall.exe
Source: Uninstall.exeBinary or memory string: OriginalFilenamelinkwiz-setup.exe2 vs Uninstall.exe
Source: Uninstall.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: classification engineClassification label: mal56.winEXE@3/9@1/0
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: 1_2_10001529 GetWindowLongA,lstrlenA,lstrlenA,lstrlenA,GlobalAlloc,wsprintfA,CreateProcessA,GetLastError,MultiByteToWideChar,MultiByteToWideChar,lstrlenA,MultiByteToWideChar,GetDlgItem,GetDlgItem,SendMessageW,SendMessageW,GetDlgItem,SendMessageW,CreateProcessWithLogonW,GetLastError,GetLastError,FormatMessageA,MessageBoxA,LocalFree,GetLastError,GlobalFree,CloseHandle,EndDialog,SetWindowLongA,GetDlgItem,GetDlgItem,SendMessageA,SendMessageA,GetDlgItem,SendMessageA,LoadLibraryA,LoadImageA,GetDlgItem,SendMessageA,SendMessageA,GetDlgItem,SendMessageA,GetDlgItem,SendMessageA,DestroyWindow,1_2_10001529
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: 1_2_10002F22 OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,CloseHandle,1_2_10002F22
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: 1_2_6E5B5EB6 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,CloseHandle,1_2_6E5B5EB6
Source: C:\Users\user\Desktop\Uninstall.exeCode function: 0_2_00404356 GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,0_2_00404356
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: 1_2_6E5AD008 GetCurrentProcessId,ProcessIdToSessionId,CreateToolhelp32Snapshot,_memset,Process32First,ProcessIdToSessionId,Process32Next,CloseHandle,CloseHandle,OpenProcess,OpenProcessToken,CloseHandle,1_2_6E5AD008
Source: C:\Users\user\Desktop\Uninstall.exeCode function: 0_2_00402020 CoCreateInstance,MultiByteToWideChar,0_2_00402020
Source: C:\Users\user\Desktop\Uninstall.exeFile created: C:\Users\user\AppData\Local\Temp\nsj1EC3.tmpJump to behavior
Source: Uninstall.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\Uninstall.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\Uninstall.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: Uninstall.exeReversingLabs: Detection: 45%
Source: Uninstall.exeVirustotal: Detection: 50%
Source: C:\Users\user\Desktop\Uninstall.exeFile read: C:\Users\user\Desktop\Uninstall.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\Uninstall.exe "C:\Users\user\Desktop\Uninstall.exe"
Source: C:\Users\user\Desktop\Uninstall.exeProcess created: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exe "C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\user\Desktop\
Source: C:\Users\user\Desktop\Uninstall.exeProcess created: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exe "C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\user\Desktop\Jump to behavior
Source: C:\Users\user\Desktop\Uninstall.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\Uninstall.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\Uninstall.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\Uninstall.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\Uninstall.exeSection loaded: shfolder.dllJump to behavior
Source: C:\Users\user\Desktop\Uninstall.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\Uninstall.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\Uninstall.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\Uninstall.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeSection loaded: shfolder.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeSection loaded: riched20.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeSection loaded: usp10.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeSection loaded: msls31.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\Uninstall.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
Source: Uninstall.exeStatic PE information: certificate valid
Source: Binary string: C:\CODE\vitruvian\client\Installers\Windows\NSISPlugin\Release\NSISPlugin.pdb source: Au_.exe, 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmp, Au_.exe, 00000001.00000002.2973586073.000000000299E000.00000004.00000020.00020000.00000000.sdmp, NSISPlugin.dll.1.dr, nsu2089.tmp.1.dr
Source: C:\Users\user\Desktop\Uninstall.exeCode function: 0_2_00405E88 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00405E88
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: 1_2_02502A10 push eax; ret 1_2_02502A3E
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: 1_2_6E5C5EA5 push ecx; ret 1_2_6E5C5EB8
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: 1_2_6E5C8473 pushad ; ret 1_2_6E5C8474
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: 1_2_6E5C12BB push ecx; ret 1_2_6E5C12CE
Source: C:\Users\user\Desktop\Uninstall.exeFile created: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeFile created: C:\Users\user\AppData\Local\Temp\nsf2165.tmp\UAC.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeFile created: C:\Users\user\AppData\Local\Temp\nsf2165.tmp\NSISPlugin.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeFile created: C:\Users\user\AppData\Local\Temp\nsf2165.tmp\nsDialogs.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeFile created: C:\Users\user\AppData\Local\Temp\nsf2165.tmp\System.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: 1_2_100012B3 GetModuleFileNameA,SendMessageA,GetDlgItem,lstrcatA,GetDlgItem,GetPrivateProfileIntA,GetPrivateProfileIntA,EnableWindow,GetPrivateProfileIntA,ShowWindow,1_2_100012B3
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: 1_2_6E5C4ED2 GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_6E5C4ED2
Source: C:\Users\user\Desktop\Uninstall.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Uninstall.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Uninstall.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: 1_2_6E5AD008 GetCurrentProcessId,ProcessIdToSessionId,CreateToolhelp32Snapshot,_memset,Process32First,ProcessIdToSessionId,Process32Next,CloseHandle,CloseHandle,OpenProcess,OpenProcessToken,CloseHandle,1_2_6E5AD008
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsf2165.tmp\UAC.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsf2165.tmp\NSISPlugin.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsf2165.tmp\nsDialogs.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsf2165.tmp\System.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_1-33805
Source: C:\Users\user\Desktop\Uninstall.exeCode function: 0_2_00405E61 FindFirstFileA,FindClose,0_2_00405E61
Source: C:\Users\user\Desktop\Uninstall.exeCode function: 0_2_0040263E FindFirstFileA,0_2_0040263E
Source: C:\Users\user\Desktop\Uninstall.exeCode function: 0_2_0040548B CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,0_2_0040548B
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: 1_2_00405E61 FindFirstFileA,FindClose,1_2_00405E61
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: 1_2_0040548B CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,1_2_0040548B
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: 1_2_0040263E FindFirstFileA,1_2_0040263E
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: 1_2_6E5BE5BB VirtualQuery,GetSystemInfo,VirtualAlloc,VirtualProtect,1_2_6E5BE5BB
Source: C:\Users\user\Desktop\Uninstall.exeAPI call chain: ExitProcess graph end nodegraph_0-3167
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeAPI call chain: ExitProcess graph end nodegraph_1-33453
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeAPI call chain: ExitProcess graph end nodegraph_1-33489
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeAPI call chain: ExitProcess graph end nodegraph_1-33491
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: 1_2_6E5CFB1E LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,IsDebuggerPresent,OutputDebugStringW,1_2_6E5CFB1E
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: 1_2_6E5CFB1E LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,IsDebuggerPresent,OutputDebugStringW,1_2_6E5CFB1E
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: 1_2_6E5AD008 GetCurrentProcessId,ProcessIdToSessionId,CreateToolhelp32Snapshot,_memset,Process32First,ProcessIdToSessionId,Process32Next,CloseHandle,CloseHandle,OpenProcess,OpenProcessToken,CloseHandle,1_2_6E5AD008
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: 1_2_6E5BE5BB VirtualProtect ?,-00000001,00000104,?,?,?,0000001C1_2_6E5BE5BB
Source: C:\Users\user\Desktop\Uninstall.exeCode function: 0_2_00405E88 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00405E88
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: 1_2_06D91759 Create,GetDlgItem,GetWindowRect,MapWindowPoints,CreateDialogParamA,SetWindowPos,SetWindowLongA,GetProcessHeap,HeapAlloc,1_2_06D91759
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: 1_2_6E5C5141 SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_6E5C5141
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: 1_2_1000255E _,CreateEventA,CreateEventA,CreateEventA,CreateFileMappingA,MapViewOfFile,GetLastError,CreateThread,GetLastError,WaitForSingleObject,GetExitCodeThread,GetCurrentProcessId,GetCurrentProcessId,GetCurrentThreadId,wsprintfA,SendMessageA,GetCurrentProcessId,GetCurrentThreadId,SetWindowLongA,GetCurrentProcessId,GetCurrentThreadId,wsprintfA,GetCurrentProcessId,GetCurrentProcessId,GetCurrentThreadId,wsprintfA,GetLastError,GetCurrentProcessId,SetCurrentDirectoryA,PostMessageA,GetCommandLineA,IsWindowVisible,GetModuleHandleA,CreateDialogParamA,GetWindowLongA,GetWindowLongA,SetWindowLongA,SetWindowPos,LoadIconA,FindWindowExA,ShowWindow,ShowWindow,FindWindowExA,GetDlgItem,ShowWindow,GetClientRect,SetWindowPos,GetWindowLongA,SetWindowLongA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,GlobalAlloc,GlobalFree,GlobalAlloc,GetModuleFileNameA,lstrlenA,GlobalAlloc,wsprintfA,SetForegroundWindow,ShellExecuteExA,GetLastError,UnhookWindowsHookEx,GetCurrentProcessId,GetCurrentThreadId,MsgWaitForMultipleObjects,GetExitCodeProcess,GetLastError,CloseHandle,CloseHandle,wsprintfA,wsprintfA,wsprintfA,wsprintfA,GlobalFree,1_2_1000255E
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: 1_2_6E5C5657 cpuid 1_2_6E5C5657
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: _GetPrimaryLen,EnumSystemLocalesW,1_2_6E5D1E0D
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: GetLocaleInfoW,GetLocaleInfoW,__wcsnicmp,GetLocaleInfoW,1_2_6E5D1E90
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,1_2_6E5D0C69
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: GetLocaleInfoW,1_2_6E5D1CA2
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: EnumSystemLocalesW,1_2_6E5D1D50
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,1_2_6E5CFDD8
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: _GetPrimaryLen,EnumSystemLocalesW,1_2_6E5D1D90
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: _TranslateName,_GetLocaleNameFromLangCountry,_GetLocaleNameFromLanguage,_TranslateName,_GetLocaleNameFromLangCountry,_GetLocaleNameFromLanguage,_GetLocaleNameFromDefault,IsValidCodePage,_wcschr,_wcschr,__itow_s,__invoke_watson,GetLocaleInfoW,1_2_6E5D1AE0
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: ___getlocaleinfo,__malloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,GetCPInfo,___crtLCMapStringA,___crtLCMapStringA,___crtGetStringTypeW,_memmove,_memmove,_memmove,InterlockedDecrement,_free,_free,_free,_free,_free,_free,_free,_free,_free,InterlockedDecrement,1_2_6E5C2919
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: __calloc_crt,__malloc_crt,_free,__malloc_crt,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_num,_free,_free,InterlockedDecrement,InterlockedDecrement,_free,_free,1_2_6E5D0665
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: GetLocaleInfoW,1_2_6E5C54E9
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: EnumSystemLocalesW,1_2_6E5C54AC
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: __calloc_crt,__malloc_crt,_free,__malloc_crt,_free,_free,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_mon,_free,_free,_free,InterlockedDecrement,InterlockedDecrement,_free,_free,1_2_6E5D025C
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: GetLocaleInfoW,_GetPrimaryLen,1_2_6E5D2258
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: _memset,_TranslateName,_TranslateName,_GetLcidFromCountry,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,__itow_s,1_2_6E5D22C0
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,_free,_free,__calloc_crt,_free,__invoke_watson,1_2_6E5C60D1
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: GetLocaleInfoW,1_2_6E5D2083
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: _wcscmp,_wcscmp,GetLocaleInfoW,GetLocaleInfoW,GetACP,1_2_6E5D21AB
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: 1_2_6E5B1ED8 GetISO8601Time,GetSystemTime,swprintf,1_2_6E5B1ED8
Source: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exeCode function: 1_2_10001164 SendMessageA,GetDlgItem,GetUserNameA,wsprintfA,GetDlgItem,GetDlgItem,SendMessageA,SendMessageA,LoadLibraryA,LoadStringA,GetDlgItem,SendMessageA,1_2_10001164
Source: C:\Users\user\Desktop\Uninstall.exeCode function: 0_2_00405B88 GetVersion,GetSystemDirectoryA,GetWindowsDirectoryA,SHGetSpecialFolderLocation,SHGetPathFromIDListA,CoTaskMemFree,lstrcatA,lstrlenA,0_2_00405B88
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire Infrastructure1
Valid Accounts
2
Native API
1
Valid Accounts
1
Valid Accounts
1
Valid Accounts
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
1
Exploitation for Privilege Escalation
1
Disable or Modify Tools
LSASS Memory14
Security Software Discovery
Remote Desktop Protocol1
Clipboard Data
1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)11
Access Token Manipulation
11
Access Token Manipulation
Security Account Manager2
Process Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
Process Injection
1
Process Injection
NTDS1
Account Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
LSA Secrets1
System Owner/User Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
Obfuscated Files or Information
Cached Domain Credentials2
File and Directory Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
DLL Side-Loading
DCSync25
System Information Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Uninstall.exe45%ReversingLabsWin32.Adware.NetFilter
Uninstall.exe51%VirustotalBrowse
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\nsf2165.tmp\NSISPlugin.dll7%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsf2165.tmp\NSISPlugin.dll14%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\nsf2165.tmp\System.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsf2165.tmp\System.dll0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\nsf2165.tmp\UAC.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsf2165.tmp\UAC.dll1%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\nsf2165.tmp\nsDialogs.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsf2165.tmp\nsDialogs.dll0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exe45%ReversingLabsWin32.Adware.NetFilter
C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exe51%VirustotalBrowse
No Antivirus matches
SourceDetectionScannerLabelLink
18.31.95.13.in-addr.arpa0%VirustotalBrowse
SourceDetectionScannerLabelLink
http://nsis.sf.net/NSIS_Error0%URL Reputationsafe
http://nsis.sf.net/NSIS_Error0%URL Reputationsafe
http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
http://crl.thawte.com/ThawteTimestampingCA.crl00%URL Reputationsafe
http://ocsp.thawte.com00%URL Reputationsafe
http://www.linkwizapp.com/uninstall-success0%VirustotalBrowse
NameIPActiveMaliciousAntivirus DetectionReputation
18.31.95.13.in-addr.arpa
unknown
unknownfalseunknown
NameSourceMaliciousAntivirus DetectionReputation
https://weld.unitegenius.com/i?e=vitruvian-installer-uninstall-v0002nsu2089.tmp.1.drfalse
    unknown
    http://nsis.sf.net/NSIS_ErrorAu_.exe, Au_.exe, 00000001.00000002.2972607881.0000000000409000.00000004.00000001.01000000.00000004.sdmp, Au_.exe, 00000001.00000000.1721749700.0000000000409000.00000008.00000001.01000000.00000004.sdmp, Uninstall.exe, Au_.exe.0.drfalse
    • URL Reputation: safe
    • URL Reputation: safe
    unknown
    http://nsis.sf.net/NSIS_ErrorErrorUninstall.exe, Au_.exe.0.drfalse
    • URL Reputation: safe
    unknown
    http://crl.thawte.com/ThawteTimestampingCA.crl0Uninstall.exe, Au_.exe.0.drfalse
    • URL Reputation: safe
    unknown
    http://www.linkwizapp.com/uninstall-successUninstall.exe, 00000000.00000002.1722365263.00000000005AE000.00000004.00000020.00020000.00000000.sdmp, Uninstall.exe, 00000000.00000002.1722642452.0000000002804000.00000004.00000020.00020000.00000000.sdmp, Au_.exe, 00000001.00000002.2973586073.000000000296D000.00000004.00000020.00020000.00000000.sdmp, Au_.exe, 00000001.00000002.2972921606.0000000000828000.00000004.00000020.00020000.00000000.sdmp, nsz1ED4.tmp.0.dr, nsu2089.tmp.1.drfalseunknown
    http://ocsp.thawte.com0Uninstall.exe, Au_.exe.0.drfalse
    • URL Reputation: safe
    unknown
    http://www.linkwizapp.com/uninstall-successrundll32.exeopenShellExecuteAsSessionUserWithFallbackUninstall.exe, 00000000.00000002.1722365263.00000000005AE000.00000004.00000020.00020000.00000000.sdmp, Uninstall.exe, 00000000.00000002.1722642452.0000000002804000.00000004.00000020.00020000.00000000.sdmp, Au_.exe, 00000001.00000002.2973586073.000000000296D000.00000004.00000020.00020000.00000000.sdmp, Au_.exe, 00000001.00000002.2972921606.0000000000828000.00000004.00000020.00020000.00000000.sdmp, nsz1ED4.tmp.0.dr, nsu2089.tmp.1.drfalse
      unknown
      No contacted IP infos
      Joe Sandbox version:41.0.0 Charoite
      Analysis ID:1528656
      Start date and time:2024-10-08 07:49:33 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 5m 14s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:6
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:Uninstall.exe
      Detection:MAL
      Classification:mal56.winEXE@3/9@1/0
      EGA Information:
      • Successful, ratio: 100%
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 80
      • Number of non-executed functions: 179
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
      • Not all processes where analyzed, report is missing behavior information
      • Report size getting too big, too many NtOpenKeyEx calls found.
      • Report size getting too big, too many NtQueryValueKey calls found.
      No simulations
      No context
      No context
      No context
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      C:\Users\user\AppData\Local\Temp\nsf2165.tmp\System.dllWhiteDefenderSetup64_20201118.exeGet hashmaliciousGuLoaderBrowse
        WhiteDefenderSetup64_20201118.exeGet hashmaliciousGuLoaderBrowse
          563299efce875400a8d9b44b96597c8e-sample (1).zipGet hashmaliciousUnknownBrowse
            file.exeGet hashmaliciousUnknownBrowse
              SecuriteInfo.com.FileRepMalware.20128.24359.exeGet hashmaliciousUnknownBrowse
                SecuriteInfo.com.Win32.Adware-gen.4366.267.exeGet hashmaliciousUnknownBrowse
                  bomgar-scc-w0yc30wie5hdhfjjhy58wyh1jzdzhxyz5yxjj7c40jc90 (1).exeGet hashmaliciousUnknownBrowse
                    bomgar-scc-w0yc30wie5hdhfjjhy58wyh1jzdzhxyz5yxjj7c40jc90 (1).exeGet hashmaliciousUnknownBrowse
                      SecuriteInfo.com.Win32.Malware-gen.27948.29630.exeGet hashmaliciousUnknownBrowse
                        https://icrealtime.com/downloads/2Get hashmaliciousUnknownBrowse
                          Process:C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exe
                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                          Category:dropped
                          Size (bytes):346624
                          Entropy (8bit):6.242686567730904
                          Encrypted:false
                          SSDEEP:6144:Vrq5Ie+LXuQbXghp2nWCU3Hi3sjLUyKiO4HbRcAQ:VXXgHxCU3pP3BO4HVlQ
                          MD5:0431EF600E258E7AFE9452DB09463CDD
                          SHA1:F16DB68FA7D7BC6883180D231F0C5802AF16B77D
                          SHA-256:EE0335B94C561AD89F5979ED1439918E7CCDC371F57282847098202DABB03609
                          SHA-512:A8DC1658BE8ED920D1C1F3BA5E509FA92C52EF92FB87ED0FAB03221F0CAD254D85EFCCAAFC4690725BD1CF1F0C57C60C85C1FA2DD0908447AED7F8A309997818
                          Malicious:true
                          Antivirus:
                          • Antivirus: ReversingLabs, Detection: 7%
                          • Antivirus: Virustotal, Detection: 14%, Browse
                          Reputation:low
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........Yrn.Yrn.Yrn.....Ern......rn.P..Xrn......rn.Yro..rn.P...Hrn.P..]rn.?...Nrn.?...Xrn.?...Xrn.?...Xrn.?...Xrn.RichYrn.........................PE..L...\,(U...........!................e.....................................................@..........................|......xo...................................1......8............................'..@...............@............................text...>........................... ..`.rdata..............................@..@.data....G.......&...l..............@....rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................
                          Process:C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exe
                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                          Category:dropped
                          Size (bytes):11264
                          Entropy (8bit):5.568877095847681
                          Encrypted:false
                          SSDEEP:192:7DKnJZCv6VmbJQC+tFiUdK7ckD4gRXKQx+LQ2CSF:7ViJrtFRdbmXK8+PCw
                          MD5:C17103AE9072A06DA581DEC998343FC1
                          SHA1:B72148C6BDFAADA8B8C3F950E610EE7CF1DA1F8D
                          SHA-256:DC58D8AD81CACB0C1ED72E33BFF8F23EA40B5252B5BB55D393A0903E6819AE2F
                          SHA-512:D32A71AAEF18E993F28096D536E41C4D016850721B31171513CE28BBD805A54FD290B7C3E9D935F72E676A1ACFB4F0DCC89D95040A0DD29F2B6975855C18986F
                          Malicious:false
                          Antivirus:
                          • Antivirus: ReversingLabs, Detection: 0%
                          • Antivirus: Virustotal, Detection: 0%, Browse
                          Joe Sandbox View:
                          • Filename: WhiteDefenderSetup64_20201118.exe, Detection: malicious, Browse
                          • Filename: WhiteDefenderSetup64_20201118.exe, Detection: malicious, Browse
                          • Filename: 563299efce875400a8d9b44b96597c8e-sample (1).zip, Detection: malicious, Browse
                          • Filename: file.exe, Detection: malicious, Browse
                          • Filename: SecuriteInfo.com.FileRepMalware.20128.24359.exe, Detection: malicious, Browse
                          • Filename: SecuriteInfo.com.Win32.Adware-gen.4366.267.exe, Detection: malicious, Browse
                          • Filename: bomgar-scc-w0yc30wie5hdhfjjhy58wyh1jzdzhxyz5yxjj7c40jc90 (1).exe, Detection: malicious, Browse
                          • Filename: bomgar-scc-w0yc30wie5hdhfjjhy58wyh1jzdzhxyz5yxjj7c40jc90 (1).exe, Detection: malicious, Browse
                          • Filename: SecuriteInfo.com.Win32.Malware-gen.27948.29630.exe, Detection: malicious, Browse
                          • Filename: , Detection: malicious, Browse
                          Reputation:moderate, very likely benign file
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......)...m.m.m...k.m.~....j....l.9..i....l.Richm.........................PE..L......K...........!................0).......0...............................`......................................p2......t0..P............................P.......................................................0..X............................text...1........................... ..`.rdata.......0......."..............@..@.data...d....@.......&..............@....reloc.......P.......(..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                          Process:C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exe
                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                          Category:dropped
                          Size (bytes):13824
                          Entropy (8bit):5.986927458483434
                          Encrypted:false
                          SSDEEP:192:vIARvmFvcukSWn8EAKVZ8148Dj33RZgqWVWYuOUEjRuFzEun0J:v2mukSe8EA88pRZAVWYuO3cFznny
                          MD5:431E5B960AA15AF5D153BAE6BA6B7E87
                          SHA1:E090C90BE02E0BAFE5F3D884C0525D8F87B3DB40
                          SHA-256:A6D956F28C32E8AA2AB2DF13EF52637E23113FAB41225031E7A3D47390A6CF13
                          SHA-512:F1526C7E4D0FCE8AB378E43E89AAFB1D7E9D57EF5324501E804091E99331DD2544912181D6D4A07D30416FE17C892867C593AEE623834935E11C7BB385C6A0A8
                          Malicious:false
                          Antivirus:
                          • Antivirus: ReversingLabs, Detection: 0%
                          • Antivirus: Virustotal, Detection: 1%, Browse
                          Reputation:moderate, very likely benign file
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........^!_.0r_.0r_.0r_.1r..0r.mrT.0r...r\.0r..6r^.0r..4r^.0rRich_.0r........PE..L...2..N...........!.....(...........-.......@...............................p.......................................7..<..../..x....P.......................`..........................................................d............................text....'.......(.................. ..`.data...T....@.......,..............@....rsrc........P.......0..............@..@.reloc.......`.......2..............@..B........................................................................................................................................................................................................................................................................................................................................................................................................
                          Process:C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exe
                          File Type:PC bitmap, Windows 3.x format, 164 x 314 x 24, image size 154490, resolution 2834 x 2834 px/m, cbSize 154544, bits offset 54
                          Category:dropped
                          Size (bytes):154544
                          Entropy (8bit):0.4630961294492186
                          Encrypted:false
                          SSDEEP:96:QVT8/8nf6rftgf5mqjpjf4xSllIWndQ2mntwdp/GqY9aZsA:QVT8EnfCftgRmqlb4cllIWdQBCyVauA
                          MD5:2B026E30A30E3FC28BC8FE1E51E8D092
                          SHA1:1DD5C6F8A612C8C582E84AFC74F6A8147D05A49B
                          SHA-256:D78746EE9DC33760E0FB84E11EEB8A4BE9C1AA49E1EC4583D65DABFE7ACC896F
                          SHA-512:0D441BA147F28F44F172EAED517C3BBE1BAAEC3AB76F27B04C4DE34E2A44B279D282C7FCADCF3E08B623BABD1151323CB4F99F94C41B6D88F35B629FB90FB728
                          Malicious:false
                          Reputation:low
                          Preview:BM.[......6...(.......:...........z[....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                          Process:C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exe
                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                          Category:dropped
                          Size (bytes):9728
                          Entropy (8bit):5.054726426952
                          Encrypted:false
                          SSDEEP:96:hBABCcnl5TKhkfLxSslykcxM2DjDf3GE+Xv8Xav+Yx4VndY7ndS27gA:h6n+0SAfRE+/8ZYxMdqn420
                          MD5:C10E04DD4AD4277D5ADC951BB331C777
                          SHA1:B1E30808198A3AE6D6D1CCA62DF8893DC2A7AD43
                          SHA-256:E31AD6C6E82E603378CB6B80E67D0E0DCD9CF384E1199AC5A65CB4935680021A
                          SHA-512:853A5564BF751D40484EA482444C6958457CB4A17FB973CF870F03F201B8B2643BE41BCCDE00F6B2026DC0C3D113E6481B0DC4C7B0F3AE7966D38C92C6B5862E
                          Malicious:false
                          Antivirus:
                          • Antivirus: ReversingLabs, Detection: 0%
                          • Antivirus: Virustotal, Detection: 0%, Browse
                          Reputation:moderate, very likely benign file
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......../.cXN`0XN`0XN`0XNa0mN`0.A=0UN`0.mP0]N`0.Hf0YN`0.nd0YN`0RichXN`0........................PE..L......K...........!......... ...............0.......................................................................6..k....0.......`.......................p.......................................................0...............................text...G........................... ..`.rdata..k....0......................@..@.data........@......................@....rsrc........`....... ..............@..@.reloc..<....p......."..............@..B................................................................................................................................................................................................................................................................................................................................................
                          Process:C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):601946
                          Entropy (8bit):5.0884036830049
                          Encrypted:false
                          SSDEEP:6144:54S6NKbqurq5Ie+LXuQbXghp2nWCU3Hi3sjLUyKiO4HbRcAQZfo7e:DXXgHxCU3pP3BO4HVlQm7e
                          MD5:1CB1AF2F9783879797843E596774706B
                          SHA1:6B129E1E06BE0C4F65D06B22C47448FFEC65919E
                          SHA-256:EF85D8D85A8DB83A8449CB3FB2ED3973A4E87FC06373FDA4C73E21F16E54F6DD
                          SHA-512:1CC0E5A55998F7CEB8513C30B86C040A24132A2428BA34A9FD767679B2E1C21A3EC1953F99313572B79888B12DEFC962EF76DCBAE189DB9C753CED0C285B0AA4
                          Malicious:false
                          Preview:........,.......,.......D"......................................................................................9...f.......8..."...............................................................................................................................................................................................l...............................................j.......m...p...v...............................................................................................................................................................................e...........#...B.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                          Process:C:\Users\user\Desktop\Uninstall.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):229013
                          Entropy (8bit):2.2128353401985317
                          Encrypted:false
                          SSDEEP:768:5to2QbPHU5yAUd6osz41S24+T+uzWSb8vGHpDVafbmXKs:5Qb6oszmS6T+uqtOJDIfbmp
                          MD5:6907B6E75F20D468BA9ACAB239580EF5
                          SHA1:BA9EE4ED79C0AFD618666CD6CB298BEE45486F8D
                          SHA-256:C22FADADADCAF4DCE5CD75B510AAAB8F02527264CF7A385A00F3C6C614C87259
                          SHA-512:D2762270664F120D2E2B266DE22A06B36584F5205CCC083002D84A982A8E6EC6385C2DA67D453B4AC79BA668077AE9570AB4F6997EFE9809974D410401E4D499
                          Malicious:false
                          Preview:........,.......,.......D"......................................................................................9...f.......8..."...............................................................................................................................................................................................l...............................................j.......m...p...v...............................................................................................................................................................................e...........#...B.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                          Process:C:\Users\user\Desktop\Uninstall.exe
                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                          Category:dropped
                          Size (bytes):313080
                          Entropy (8bit):6.7841640934475
                          Encrypted:false
                          SSDEEP:6144:ES8gNaHlKBtpPFu5nvmrWMPOzT2QnMNloanqpZe8QvTq4Txss2jLm:CgNaHlKBtpPFu5nvmnOzT2QnMNlypZ5O
                          MD5:7904BE8F714449E8D7D23D98D5942AEF
                          SHA1:A5F579B308D08E595CB6B3601E7E354F157BE33D
                          SHA-256:C5E1DF2580FA74E4CAA8FF329D1E4B820093EF9D29433E644B227186BEB6954A
                          SHA-512:250F5FA4A891CF6A470613752F35A67676D0386DD54B6AA5C419F79E7476910C9A212E996FCA759726F4D97FFA54F963058593A885C3613305B8D37BB153F70E
                          Malicious:true
                          Antivirus:
                          • Antivirus: ReversingLabs, Detection: 45%
                          • Antivirus: Virustotal, Detection: 51%, Browse
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1..:u..iu..iu..i..iw..iu..i...i..id..i!..i...i...it..iRichu..i........................PE..L......K.................\....... ..<2.......p....@..........................P......<........................................s..........................@............................................................p...............................text...ZZ.......\.................. ..`.rdata.......p.......`..............@..@.data................r..............@....ndata...@...p...........................rsrc................v..............@..@................................................................................................................................................................................................................................................................................................................................................
                          Process:C:\Users\user\Desktop\Uninstall.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:modified
                          Size (bytes):26
                          Entropy (8bit):3.95006375643621
                          Encrypted:false
                          SSDEEP:3:ggPYV:rPYV
                          MD5:187F488E27DB4AF347237FE461A079AD
                          SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                          SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                          SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                          Malicious:false
                          Preview:[ZoneTransfer]....ZoneId=0
                          File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                          Entropy (8bit):6.7841640934475
                          TrID:
                          • Win32 Executable (generic) a (10002005/4) 92.16%
                          • NSIS - Nullsoft Scriptable Install System (846627/2) 7.80%
                          • Generic Win/DOS Executable (2004/3) 0.02%
                          • DOS Executable Generic (2002/1) 0.02%
                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                          File name:Uninstall.exe
                          File size:313'080 bytes
                          MD5:7904be8f714449e8d7d23d98d5942aef
                          SHA1:a5f579b308d08e595cb6b3601e7e354f157be33d
                          SHA256:c5e1df2580fa74e4caa8ff329d1e4b820093ef9d29433e644b227186beb6954a
                          SHA512:250f5fa4a891cf6a470613752f35a67676d0386dd54b6aa5c419f79e7476910c9a212e996fca759726f4d97ffa54f963058593a885c3613305b8d37bb153f70e
                          SSDEEP:6144:ES8gNaHlKBtpPFu5nvmrWMPOzT2QnMNloanqpZe8QvTq4Txss2jLm:CgNaHlKBtpPFu5nvmnOzT2QnMNlypZ5O
                          TLSH:F164AD03B765E4BEFD418971CDBAA2F942E2EC9AE5C395831B6BBE1734760901C7C241
                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1..:u..iu..iu..i...iw..iu..i...i...id..i!..i...i...it..iRichu..i........................PE..L......K.................\....... .
                          Icon Hash:982e666331994b26
                          Entrypoint:0x40323c
                          Entrypoint Section:.text
                          Digitally signed:true
                          Imagebase:0x400000
                          Subsystem:windows gui
                          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                          DLL Characteristics:TERMINAL_SERVER_AWARE
                          Time Stamp:0x4B1AE416 [Sat Dec 5 22:52:06 2009 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:4
                          OS Version Minor:0
                          File Version Major:4
                          File Version Minor:0
                          Subsystem Version Major:4
                          Subsystem Version Minor:0
                          Import Hash:099c0646ea7282d232219f8807883be0
                          Signature Valid:true
                          Signature Issuer:CN=GlobalSign CodeSigning CA - G2, O=GlobalSign nv-sa, C=BE
                          Signature Validation Error:The operation completed successfully
                          Error Number:0
                          Not Before, Not After
                          • 23/02/2015 18:43:50 23/02/2017 18:43:50
                          Subject Chain
                          • E=support@linkwizapp.com, CN=LinkWiz, O=LinkWiz, L=San Diego, S=CA, C=US
                          Version:3
                          Thumbprint MD5:CEFC9D69B520F5C1B5BF01990D39C721
                          Thumbprint SHA-1:E6D96B042E485260A210D2A6D37DA26EF2DFD2AF
                          Thumbprint SHA-256:131C0A4FFFDD09C9603F6EE5D96BC1A7234D05DF6F1066387EC8944F1454FB15
                          Serial:1121A175F4ACE7F00EC14DB23572A3C1D217
                          Instruction
                          sub esp, 00000180h
                          push ebx
                          push ebp
                          push esi
                          xor ebx, ebx
                          push edi
                          mov dword ptr [esp+18h], ebx
                          mov dword ptr [esp+10h], 00409130h
                          xor esi, esi
                          mov byte ptr [esp+14h], 00000020h
                          call dword ptr [00407030h]
                          push 00008001h
                          call dword ptr [004070B4h]
                          push ebx
                          call dword ptr [0040727Ch]
                          push 00000008h
                          mov dword ptr [00446F58h], eax
                          call 00007F5BC0D798CEh
                          mov dword ptr [00446EA4h], eax
                          push ebx
                          lea eax, dword ptr [esp+34h]
                          push 00000160h
                          push eax
                          push ebx
                          push 00429C58h
                          call dword ptr [00407158h]
                          push 004091B8h
                          push 00442EA0h
                          call 00007F5BC0D79581h
                          call dword ptr [004070B0h]
                          mov edi, 0046F000h
                          push eax
                          push edi
                          call 00007F5BC0D7956Fh
                          push ebx
                          call dword ptr [0040710Ch]
                          cmp byte ptr [0046F000h], 00000022h
                          mov dword ptr [00446EA0h], eax
                          mov eax, edi
                          jne 00007F5BC0D76CCCh
                          mov byte ptr [esp+14h], 00000022h
                          mov eax, 0046F001h
                          push dword ptr [esp+14h]
                          push eax
                          call 00007F5BC0D79062h
                          push eax
                          call dword ptr [0040721Ch]
                          mov dword ptr [esp+1Ch], eax
                          jmp 00007F5BC0D76D25h
                          cmp cl, 00000020h
                          jne 00007F5BC0D76CC8h
                          inc eax
                          cmp byte ptr [eax], 00000020h
                          je 00007F5BC0D76CBCh
                          cmp byte ptr [eax], 00000022h
                          mov byte ptr [eax+eax+00h], 00000000h
                          Programming Language:
                          • [EXP] VC++ 6.0 SP5 build 8804
                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IMPORT0x73a40xb4.rdata
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x12b0000x19b90.rsrc
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x4b0b80x1640.ndata
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0x70000x28c.rdata
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .text0x10000x5a5a0x5c00c3953c262c50b3d94af076321878ec20False0.6607931385869565data6.434848356779889IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          .rdata0x70000x11900x1200f179218a059068529bdb4637ef5fa28eFalse0.4453125data5.181627099249737IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .data0x90000x3df980x4008304967a23ff32b1b0197005a845ef83False0.5576171875data4.702855480290031IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .ndata0x470000xe40000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .rsrc0x12b0000x19b900x19c00188016699e4727688e035b29e6d527b1False0.12031629247572816data2.884863625259417IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          NameRVASizeTypeLanguageCountryZLIB Complexity
                          RT_BITMAP0x12b3400x666Device independent bitmap graphic, 96 x 16 x 8, image size 1538, resolution 2868 x 2868 px/m, 15 important colorsEnglishUnited States0.18192918192918192
                          RT_ICON0x12b9a80x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536EnglishUnited States0.07559446350408139
                          RT_ICON0x13c1d00x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384EnglishUnited States0.12990080302314597
                          RT_ICON0x1403f80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216EnglishUnited States0.21607883817427387
                          RT_ICON0x1429a00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096EnglishUnited States0.23944652908067543
                          RT_ICON0x143a480x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024EnglishUnited States0.4370567375886525
                          RT_DIALOG0x143eb00x118dataEnglishUnited States0.5428571428571428
                          RT_DIALOG0x143fc80x202dataEnglishUnited States0.4085603112840467
                          RT_DIALOG0x1441d00xf8dataEnglishUnited States0.6290322580645161
                          RT_DIALOG0x1442c80xf4dataEnglishUnited States0.5450819672131147
                          RT_DIALOG0x1443c00xeedataEnglishUnited States0.6260504201680672
                          RT_GROUP_ICON0x1444b00x4cdataEnglishUnited States0.7894736842105263
                          RT_VERSION0x1445000x2d0data0.44583333333333336
                          RT_MANIFEST0x1447d00x3baXML 1.0 document, ASCII text, with very long lines (954), with no line terminatorsEnglishUnited States0.5209643605870021
                          DLLImport
                          KERNEL32.dllCompareFileTime, SearchPathA, GetShortPathNameA, GetFullPathNameA, MoveFileA, SetCurrentDirectoryA, GetFileAttributesA, GetLastError, CreateDirectoryA, SetFileAttributesA, Sleep, GetTickCount, CreateFileA, GetFileSize, GetModuleFileNameA, GetCurrentProcess, CopyFileA, ExitProcess, SetFileTime, GetTempPathA, GetCommandLineA, SetErrorMode, LoadLibraryA, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GlobalLock, CreateThread, CreateProcessA, RemoveDirectoryA, GetTempFileNameA, lstrlenA, lstrcatA, GetSystemDirectoryA, GetVersion, CloseHandle, lstrcmpiA, lstrcmpA, ExpandEnvironmentStringsA, GlobalFree, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GetModuleHandleA, LoadLibraryExA, GetProcAddress, FreeLibrary, MultiByteToWideChar, WritePrivateProfileStringA, GetPrivateProfileStringA, WriteFile, ReadFile, MulDiv, SetFilePointer, FindClose, FindNextFileA, FindFirstFileA, DeleteFileA, GetWindowsDirectoryA
                          USER32.dllEndDialog, ScreenToClient, GetWindowRect, EnableMenuItem, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, RegisterClassA, TrackPopupMenu, AppendMenuA, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, DestroyWindow, CreateDialogParamA, SetTimer, SetWindowTextA, PostQuitMessage, SetForegroundWindow, wsprintfA, SendMessageTimeoutA, FindWindowExA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, OpenClipboard, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongA, LoadImageA, GetDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndPaint, ShowWindow
                          GDI32.dllSetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectA, SetBkMode, SetTextColor, SelectObject
                          SHELL32.dllSHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, ShellExecuteA, SHFileOperationA, SHGetSpecialFolderLocation
                          ADVAPI32.dllRegQueryValueExA, RegSetValueExA, RegEnumKeyA, RegEnumValueA, RegOpenKeyExA, RegDeleteKeyA, RegDeleteValueA, RegCloseKey, RegCreateKeyExA
                          COMCTL32.dllImageList_AddMasked, ImageList_Destroy, ImageList_Create
                          ole32.dllCoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance
                          VERSION.dllGetFileVersionInfoSizeA, GetFileVersionInfoA, VerQueryValueA
                          Language of compilation systemCountry where language is spokenMap
                          EnglishUnited States
                          TimestampSource PortDest PortSource IPDest IP
                          Oct 8, 2024 07:51:03.342514038 CEST5360292162.159.36.2192.168.2.4
                          Oct 8, 2024 07:51:03.834114075 CEST5568353192.168.2.41.1.1.1
                          Oct 8, 2024 07:51:03.842317104 CEST53556831.1.1.1192.168.2.4
                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                          Oct 8, 2024 07:51:03.834114075 CEST192.168.2.41.1.1.10xa826Standard query (0)18.31.95.13.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                          Oct 8, 2024 07:51:03.842317104 CEST1.1.1.1192.168.2.40xa826Name error (3)18.31.95.13.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false

                          Click to jump to process

                          Click to jump to process

                          Click to dive into process behavior distribution

                          Click to jump to process

                          Target ID:0
                          Start time:01:50:29
                          Start date:08/10/2024
                          Path:C:\Users\user\Desktop\Uninstall.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\Desktop\Uninstall.exe"
                          Imagebase:0x400000
                          File size:313'080 bytes
                          MD5 hash:7904BE8F714449E8D7D23D98D5942AEF
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:low
                          Has exited:true

                          Target ID:1
                          Start time:01:50:30
                          Start date:08/10/2024
                          Path:C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\user\Desktop\
                          Imagebase:0x400000
                          File size:313'080 bytes
                          MD5 hash:7904BE8F714449E8D7D23D98D5942AEF
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Antivirus matches:
                          • Detection: 45%, ReversingLabs
                          • Detection: 51%, Virustotal, Browse
                          Reputation:low
                          Has exited:false

                          Reset < >

                            Execution Graph

                            Execution Coverage:8.8%
                            Dynamic/Decrypted Code Coverage:0%
                            Signature Coverage:22.1%
                            Total number of Nodes:1252
                            Total number of Limit Nodes:20
                            execution_graph 3380 401cc1 GetDlgItem GetClientRect 3385 4029f6 3380->3385 3383 401d0f DeleteObject 3384 40288b 3383->3384 3386 402a02 3385->3386 3387 405b88 18 API calls 3386->3387 3388 402a23 3387->3388 3389 401cf1 LoadImageA SendMessageA 3388->3389 3390 405dc8 5 API calls 3388->3390 3389->3383 3389->3384 3390->3389 3391 401dc1 3392 4029f6 18 API calls 3391->3392 3393 401dc7 3392->3393 3394 4029f6 18 API calls 3393->3394 3395 401dd0 3394->3395 3396 4029f6 18 API calls 3395->3396 3397 401dd9 3396->3397 3398 4029f6 18 API calls 3397->3398 3399 401de2 3398->3399 3403 401423 3399->3403 3402 401e16 3404 404f04 25 API calls 3403->3404 3405 401431 ShellExecuteA 3404->3405 3405->3402 3406 405042 3407 405063 GetDlgItem GetDlgItem GetDlgItem 3406->3407 3408 4051ee 3406->3408 3452 403f4d SendMessageA 3407->3452 3410 4051f7 GetDlgItem CreateThread CloseHandle 3408->3410 3411 40521f 3408->3411 3410->3411 3413 40524a 3411->3413 3414 405236 ShowWindow ShowWindow 3411->3414 3415 40526c 3411->3415 3412 4050d4 3417 4050db GetClientRect GetSystemMetrics SendMessageA SendMessageA 3412->3417 3416 4052a8 3413->3416 3419 405281 ShowWindow 3413->3419 3420 40525b 3413->3420 3457 403f4d SendMessageA 3414->3457 3461 403f7f 3415->3461 3416->3415 3426 4052b3 SendMessageA 3416->3426 3424 40514a 3417->3424 3425 40512e SendMessageA SendMessageA 3417->3425 3422 4052a1 3419->3422 3423 405293 3419->3423 3458 403ef1 3420->3458 3429 403ef1 SendMessageA 3422->3429 3428 404f04 25 API calls 3423->3428 3430 40515d 3424->3430 3431 40514f SendMessageA 3424->3431 3425->3424 3432 4052cc CreatePopupMenu 3426->3432 3433 40527a 3426->3433 3428->3422 3429->3416 3453 403f18 3430->3453 3431->3430 3434 405b88 18 API calls 3432->3434 3436 4052dc AppendMenuA 3434->3436 3438 405302 3436->3438 3439 4052ef GetWindowRect 3436->3439 3437 40516d 3440 405176 ShowWindow 3437->3440 3441 4051aa GetDlgItem SendMessageA 3437->3441 3443 40530b TrackPopupMenu 3438->3443 3439->3443 3444 405199 3440->3444 3445 40518c ShowWindow 3440->3445 3441->3433 3442 4051d1 SendMessageA SendMessageA 3441->3442 3442->3433 3443->3433 3446 405329 3443->3446 3456 403f4d SendMessageA 3444->3456 3445->3444 3447 405345 SendMessageA 3446->3447 3447->3447 3449 405362 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 3447->3449 3450 405384 SendMessageA 3449->3450 3450->3450 3451 4053a5 GlobalUnlock SetClipboardData CloseClipboard 3450->3451 3451->3433 3452->3412 3454 405b88 18 API calls 3453->3454 3455 403f23 SetDlgItemTextA 3454->3455 3455->3437 3456->3441 3457->3413 3459 403ef8 3458->3459 3460 403efe SendMessageA 3458->3460 3459->3460 3460->3415 3462 403f97 GetWindowLongA 3461->3462 3463 404020 3461->3463 3462->3463 3464 403fa8 3462->3464 3463->3433 3465 403fb7 GetSysColor 3464->3465 3466 403fba 3464->3466 3465->3466 3467 403fc0 SetTextColor 3466->3467 3468 403fca SetBkMode 3466->3468 3467->3468 3469 403fe2 GetSysColor 3468->3469 3470 403fe8 3468->3470 3469->3470 3471 403ff9 3470->3471 3472 403fef SetBkColor 3470->3472 3471->3463 3473 404013 CreateBrushIndirect 3471->3473 3474 40400c DeleteObject 3471->3474 3472->3471 3473->3463 3474->3473 3475 401645 3476 4029f6 18 API calls 3475->3476 3477 40164c 3476->3477 3478 4029f6 18 API calls 3477->3478 3479 401655 3478->3479 3480 4029f6 18 API calls 3479->3480 3481 40165e MoveFileA 3480->3481 3482 40166a 3481->3482 3483 401671 3481->3483 3485 401423 25 API calls 3482->3485 3484 405e61 2 API calls 3483->3484 3487 402169 3483->3487 3486 401680 3484->3486 3485->3487 3486->3487 3488 4058b4 39 API calls 3486->3488 3488->3482 3489 403a45 3490 403b98 3489->3490 3491 403a5d 3489->3491 3492 403ba9 GetDlgItem GetDlgItem 3490->3492 3501 403be9 3490->3501 3491->3490 3493 403a69 3491->3493 3494 403f18 19 API calls 3492->3494 3496 403a74 SetWindowPos 3493->3496 3497 403a87 3493->3497 3500 403bd3 SetClassLongA 3494->3500 3495 403c43 3502 403f64 SendMessageA 3495->3502 3507 403b93 3495->3507 3496->3497 3498 403aa4 3497->3498 3499 403a8c ShowWindow 3497->3499 3503 403ac6 3498->3503 3504 403aac DestroyWindow 3498->3504 3499->3498 3505 40140b 2 API calls 3500->3505 3501->3495 3506 401389 2 API calls 3501->3506 3529 403c55 3502->3529 3509 403acb SetWindowLongA 3503->3509 3510 403adc 3503->3510 3508 403ea1 3504->3508 3505->3501 3511 403c1b 3506->3511 3508->3507 3517 403ed2 ShowWindow 3508->3517 3509->3507 3514 403b53 3510->3514 3515 403ae8 GetDlgItem 3510->3515 3511->3495 3516 403c1f SendMessageA 3511->3516 3512 40140b 2 API calls 3512->3529 3513 403ea3 DestroyWindow EndDialog 3513->3508 3520 403f7f 8 API calls 3514->3520 3518 403b18 3515->3518 3519 403afb SendMessageA IsWindowEnabled 3515->3519 3516->3507 3517->3507 3522 403b25 3518->3522 3525 403b6c SendMessageA 3518->3525 3526 403b38 3518->3526 3532 403b1d 3518->3532 3519->3507 3519->3518 3520->3507 3521 405b88 18 API calls 3521->3529 3522->3525 3522->3532 3523 403ef1 SendMessageA 3523->3514 3524 403f18 19 API calls 3524->3529 3525->3514 3527 403b40 3526->3527 3528 403b55 3526->3528 3530 40140b 2 API calls 3527->3530 3531 40140b 2 API calls 3528->3531 3529->3507 3529->3512 3529->3513 3529->3521 3529->3524 3533 403f18 19 API calls 3529->3533 3548 403de3 DestroyWindow 3529->3548 3530->3532 3531->3532 3532->3514 3532->3523 3534 403cd0 GetDlgItem 3533->3534 3535 403ce5 3534->3535 3536 403ced ShowWindow EnableWindow 3534->3536 3535->3536 3557 403f3a EnableWindow 3536->3557 3538 403d17 EnableWindow 3541 403d2b 3538->3541 3539 403d30 GetSystemMenu EnableMenuItem SendMessageA 3540 403d60 SendMessageA 3539->3540 3539->3541 3540->3541 3541->3539 3558 403f4d SendMessageA 3541->3558 3559 405b66 lstrcpynA 3541->3559 3544 403d8e lstrlenA 3545 405b88 18 API calls 3544->3545 3546 403d9f SetWindowTextA 3545->3546 3547 401389 2 API calls 3546->3547 3547->3529 3548->3508 3549 403dfd CreateDialogParamA 3548->3549 3549->3508 3550 403e30 3549->3550 3551 403f18 19 API calls 3550->3551 3552 403e3b GetDlgItem GetWindowRect ScreenToClient SetWindowPos 3551->3552 3553 401389 2 API calls 3552->3553 3554 403e81 3553->3554 3554->3507 3555 403e89 ShowWindow 3554->3555 3556 403f64 SendMessageA 3555->3556 3556->3508 3557->3538 3558->3541 3559->3544 3560 401ec5 3561 4029f6 18 API calls 3560->3561 3562 401ecc GetFileVersionInfoSizeA 3561->3562 3563 401eef GlobalAlloc 3562->3563 3564 401f45 3562->3564 3563->3564 3565 401f03 GetFileVersionInfoA 3563->3565 3565->3564 3566 401f14 VerQueryValueA 3565->3566 3566->3564 3567 401f2d 3566->3567 3571 405ac4 wsprintfA 3567->3571 3569 401f39 3572 405ac4 wsprintfA 3569->3572 3571->3569 3572->3564 3576 4025cc 3577 4025d3 3576->3577 3583 402838 3576->3583 3584 4029d9 3577->3584 3579 4025de 3580 4025e5 SetFilePointer 3579->3580 3581 4025f5 3580->3581 3580->3583 3587 405ac4 wsprintfA 3581->3587 3585 405b88 18 API calls 3584->3585 3586 4029ed 3585->3586 3586->3579 3587->3583 3595 401f51 3596 401f63 3595->3596 3606 402012 3595->3606 3597 4029f6 18 API calls 3596->3597 3598 401f6a 3597->3598 3600 4029f6 18 API calls 3598->3600 3599 401423 25 API calls 3601 402169 3599->3601 3602 401f73 3600->3602 3603 401f88 LoadLibraryExA 3602->3603 3604 401f7b GetModuleHandleA 3602->3604 3605 401f98 GetProcAddress 3603->3605 3603->3606 3604->3603 3604->3605 3607 401fe5 3605->3607 3608 401fa8 3605->3608 3606->3599 3609 404f04 25 API calls 3607->3609 3610 401423 25 API calls 3608->3610 3611 401fb8 3608->3611 3609->3611 3610->3611 3611->3601 3612 402006 FreeLibrary 3611->3612 3612->3601 3613 404853 GetDlgItem GetDlgItem 3614 4048a7 7 API calls 3613->3614 3621 404ac4 3613->3621 3615 404940 SendMessageA 3614->3615 3616 40494d DeleteObject 3614->3616 3615->3616 3617 404958 3616->3617 3619 40498f 3617->3619 3620 405b88 18 API calls 3617->3620 3618 404bae 3623 404c5d 3618->3623 3628 404ab7 3618->3628 3629 404c07 SendMessageA 3618->3629 3622 403f18 19 API calls 3619->3622 3624 404971 SendMessageA SendMessageA 3620->3624 3621->3618 3648 404b38 3621->3648 3666 4047d3 SendMessageA 3621->3666 3627 4049a3 3622->3627 3625 404c72 3623->3625 3626 404c66 SendMessageA 3623->3626 3624->3617 3637 404c84 ImageList_Destroy 3625->3637 3638 404c8b 3625->3638 3642 404c9b 3625->3642 3626->3625 3633 403f18 19 API calls 3627->3633 3630 403f7f 8 API calls 3628->3630 3629->3628 3635 404c1c SendMessageA 3629->3635 3636 404e4d 3630->3636 3631 404ba0 SendMessageA 3631->3618 3645 4049b1 3633->3645 3634 404e01 3634->3628 3643 404e13 ShowWindow GetDlgItem ShowWindow 3634->3643 3639 404c2f 3635->3639 3637->3638 3640 404c94 GlobalFree 3638->3640 3638->3642 3651 404c40 SendMessageA 3639->3651 3640->3642 3641 404a85 GetWindowLongA SetWindowLongA 3644 404a9e 3641->3644 3642->3634 3650 40140b 2 API calls 3642->3650 3657 404ccd 3642->3657 3643->3628 3646 404aa4 ShowWindow 3644->3646 3647 404abc 3644->3647 3645->3641 3649 404a00 SendMessageA 3645->3649 3652 404a7f 3645->3652 3655 404a3c SendMessageA 3645->3655 3656 404a4d SendMessageA 3645->3656 3664 403f4d SendMessageA 3646->3664 3665 403f4d SendMessageA 3647->3665 3648->3618 3648->3631 3649->3645 3650->3657 3651->3623 3652->3641 3652->3644 3655->3645 3656->3645 3659 404d11 3657->3659 3660 404cfb SendMessageA 3657->3660 3658 404dd7 InvalidateRect 3658->3634 3661 404ded 3658->3661 3659->3658 3663 404d85 SendMessageA SendMessageA 3659->3663 3660->3659 3671 4046f1 3661->3671 3663->3659 3664->3628 3665->3621 3667 404832 SendMessageA 3666->3667 3668 4047f6 GetMessagePos ScreenToClient SendMessageA 3666->3668 3669 40482a 3667->3669 3668->3669 3670 40482f 3668->3670 3669->3648 3670->3667 3672 40470b 3671->3672 3673 405b88 18 API calls 3672->3673 3674 404740 3673->3674 3675 405b88 18 API calls 3674->3675 3676 40474b 3675->3676 3677 405b88 18 API calls 3676->3677 3678 40477c lstrlenA wsprintfA SetDlgItemTextA 3677->3678 3678->3634 3679 404e54 3680 404e62 3679->3680 3681 404e79 3679->3681 3682 404e68 3680->3682 3697 404ee2 3680->3697 3683 404e87 IsWindowVisible 3681->3683 3689 404e9e 3681->3689 3684 403f64 SendMessageA 3682->3684 3686 404e94 3683->3686 3683->3697 3687 404e72 3684->3687 3685 404ee8 CallWindowProcA 3685->3687 3688 4047d3 5 API calls 3686->3688 3688->3689 3689->3685 3698 405b66 lstrcpynA 3689->3698 3691 404ecd 3699 405ac4 wsprintfA 3691->3699 3693 404ed4 3694 40140b 2 API calls 3693->3694 3695 404edb 3694->3695 3700 405b66 lstrcpynA 3695->3700 3697->3685 3698->3691 3699->3693 3700->3697 3701 404356 3702 404394 3701->3702 3703 404387 3701->3703 3705 40439d GetDlgItem 3702->3705 3711 404400 3702->3711 3762 40540b GetDlgItemTextA 3703->3762 3707 4043b1 3705->3707 3706 40438e 3709 405dc8 5 API calls 3706->3709 3710 4043c5 SetWindowTextA 3707->3710 3714 4056ed 4 API calls 3707->3714 3708 4044e4 3759 404670 3708->3759 3764 40540b GetDlgItemTextA 3708->3764 3709->3702 3715 403f18 19 API calls 3710->3715 3711->3708 3716 405b88 18 API calls 3711->3716 3711->3759 3713 403f7f 8 API calls 3721 404684 3713->3721 3722 4043bb 3714->3722 3718 4043e3 3715->3718 3719 404476 SHBrowseForFolderA 3716->3719 3717 404510 3720 40573a 18 API calls 3717->3720 3723 403f18 19 API calls 3718->3723 3719->3708 3724 40448e CoTaskMemFree 3719->3724 3725 404516 3720->3725 3722->3710 3728 405659 3 API calls 3722->3728 3726 4043f1 3723->3726 3727 405659 3 API calls 3724->3727 3765 405b66 lstrcpynA 3725->3765 3763 403f4d SendMessageA 3726->3763 3730 40449b 3727->3730 3728->3710 3733 4044d2 SetDlgItemTextA 3730->3733 3737 405b88 18 API calls 3730->3737 3732 4043f9 3735 405e88 3 API calls 3732->3735 3733->3708 3734 40452d 3736 405e88 3 API calls 3734->3736 3735->3711 3744 404535 3736->3744 3738 4044ba lstrcmpiA 3737->3738 3738->3733 3741 4044cb lstrcatA 3738->3741 3739 40456f 3766 405b66 lstrcpynA 3739->3766 3741->3733 3742 404578 3743 4056ed 4 API calls 3742->3743 3745 40457e GetDiskFreeSpaceA 3743->3745 3744->3739 3748 4056a0 2 API calls 3744->3748 3749 4045c2 3744->3749 3747 4045a0 MulDiv 3745->3747 3745->3749 3747->3749 3748->3744 3750 4046f1 21 API calls 3749->3750 3760 40461f 3749->3760 3751 404611 3750->3751 3754 404621 SetDlgItemTextA 3751->3754 3755 404616 3751->3755 3752 40140b 2 API calls 3756 404642 3752->3756 3754->3760 3758 4046f1 21 API calls 3755->3758 3767 403f3a EnableWindow 3756->3767 3757 40465e 3757->3759 3768 4042eb 3757->3768 3758->3760 3759->3713 3760->3752 3760->3756 3762->3706 3763->3732 3764->3717 3765->3734 3766->3742 3767->3757 3769 4042f9 3768->3769 3770 4042fe SendMessageA 3768->3770 3769->3770 3770->3759 3771 4014d6 3772 4029d9 18 API calls 3771->3772 3773 4014dc Sleep 3772->3773 3775 40288b 3773->3775 3781 4018d8 3782 40190f 3781->3782 3783 4029f6 18 API calls 3782->3783 3784 401914 3783->3784 3785 40548b 69 API calls 3784->3785 3786 40191d 3785->3786 3787 4018db 3788 4029f6 18 API calls 3787->3788 3789 4018e2 3788->3789 3790 405427 MessageBoxIndirectA 3789->3790 3791 4018eb 3790->3791 3792 404060 3793 404076 3792->3793 3801 404183 3792->3801 3797 403f18 19 API calls 3793->3797 3794 4041f2 3795 4042c6 3794->3795 3796 4041fc GetDlgItem 3794->3796 3802 403f7f 8 API calls 3795->3802 3799 404212 3796->3799 3800 404284 3796->3800 3798 4040cc 3797->3798 3803 403f18 19 API calls 3798->3803 3799->3800 3807 404238 6 API calls 3799->3807 3800->3795 3808 404296 3800->3808 3801->3794 3801->3795 3804 4041c7 GetDlgItem SendMessageA 3801->3804 3805 4042c1 3802->3805 3806 4040d9 CheckDlgButton 3803->3806 3823 403f3a EnableWindow 3804->3823 3821 403f3a EnableWindow 3806->3821 3807->3800 3811 40429c SendMessageA 3808->3811 3812 4042ad 3808->3812 3811->3812 3812->3805 3816 4042b3 SendMessageA 3812->3816 3813 4041ed 3814 4042eb SendMessageA 3813->3814 3814->3794 3815 4040f7 GetDlgItem 3822 403f4d SendMessageA 3815->3822 3816->3805 3818 40410d SendMessageA 3819 404134 SendMessageA SendMessageA lstrlenA SendMessageA SendMessageA 3818->3819 3820 40412b GetSysColor 3818->3820 3819->3805 3820->3819 3821->3815 3822->3818 3823->3813 3824 401ae5 3825 4029f6 18 API calls 3824->3825 3826 401aec 3825->3826 3827 4029d9 18 API calls 3826->3827 3828 401af5 wsprintfA 3827->3828 3829 40288b 3828->3829 3830 402866 SendMessageA 3831 402880 InvalidateRect 3830->3831 3832 40288b 3830->3832 3831->3832 3840 4019e6 3841 4029f6 18 API calls 3840->3841 3842 4019ef ExpandEnvironmentStringsA 3841->3842 3843 401a03 3842->3843 3845 401a16 3842->3845 3844 401a08 lstrcmpA 3843->3844 3843->3845 3844->3845 3846 402267 3847 4029f6 18 API calls 3846->3847 3848 402275 3847->3848 3849 4029f6 18 API calls 3848->3849 3850 40227e 3849->3850 3851 4029f6 18 API calls 3850->3851 3852 402288 GetPrivateProfileStringA 3851->3852 3860 401c6d 3861 4029d9 18 API calls 3860->3861 3862 401c73 IsWindow 3861->3862 3863 4019d6 3862->3863 3864 40366d 3865 403678 3864->3865 3866 40367c 3865->3866 3867 40367f GlobalAlloc 3865->3867 3867->3866 3875 4014f0 SetForegroundWindow 3876 40288b 3875->3876 3877 402172 3878 4029f6 18 API calls 3877->3878 3879 402178 3878->3879 3880 4029f6 18 API calls 3879->3880 3881 402181 3880->3881 3882 4029f6 18 API calls 3881->3882 3883 40218a 3882->3883 3884 405e61 2 API calls 3883->3884 3885 402193 3884->3885 3886 4021a4 lstrlenA lstrlenA 3885->3886 3890 402197 3885->3890 3888 404f04 25 API calls 3886->3888 3887 404f04 25 API calls 3891 40219f 3887->3891 3889 4021e0 SHFileOperationA 3888->3889 3889->3890 3889->3891 3890->3887 3890->3891 3892 4021f4 3893 4021fb 3892->3893 3895 40220e 3892->3895 3894 405b88 18 API calls 3893->3894 3896 402208 3894->3896 3897 405427 MessageBoxIndirectA 3896->3897 3897->3895 3898 4016fa 3899 4029f6 18 API calls 3898->3899 3900 401701 SearchPathA 3899->3900 3901 40171c 3900->3901 3902 4025fb 3903 402602 3902->3903 3904 40288b 3902->3904 3905 402608 FindClose 3903->3905 3905->3904 3906 40267c 3907 4029f6 18 API calls 3906->3907 3909 40268a 3907->3909 3908 4026a0 3911 40581e 2 API calls 3908->3911 3909->3908 3910 4029f6 18 API calls 3909->3910 3910->3908 3912 4026a6 3911->3912 3932 40583d GetFileAttributesA CreateFileA 3912->3932 3914 4026b3 3915 40275c 3914->3915 3916 4026bf GlobalAlloc 3914->3916 3919 402764 DeleteFileA 3915->3919 3920 402777 3915->3920 3917 402753 CloseHandle 3916->3917 3918 4026d8 3916->3918 3917->3915 3933 4031f1 SetFilePointer 3918->3933 3919->3920 3922 4026de 3923 4031bf ReadFile 3922->3923 3924 4026e7 GlobalAlloc 3923->3924 3925 4026f7 3924->3925 3926 40272b WriteFile GlobalFree 3924->3926 3928 402f18 48 API calls 3925->3928 3927 402f18 48 API calls 3926->3927 3929 402750 3927->3929 3931 402704 3928->3931 3929->3917 3930 402722 GlobalFree 3930->3926 3931->3930 3932->3914 3933->3922 3934 40277d 3935 4029d9 18 API calls 3934->3935 3936 402783 3935->3936 3937 4027a7 3936->3937 3938 4027be 3936->3938 3947 40265c 3936->3947 3941 4027bb 3937->3941 3944 4027ac 3937->3944 3939 4027d4 3938->3939 3940 4027c8 3938->3940 3943 405b88 18 API calls 3939->3943 3942 4029d9 18 API calls 3940->3942 3949 405ac4 wsprintfA 3941->3949 3942->3947 3943->3947 3948 405b66 lstrcpynA 3944->3948 3948->3947 3949->3947 3957 4014fe 3958 401506 3957->3958 3960 401519 3957->3960 3959 4029d9 18 API calls 3958->3959 3959->3960 3961 401000 3962 401037 BeginPaint GetClientRect 3961->3962 3963 40100c DefWindowProcA 3961->3963 3964 4010f3 3962->3964 3966 401179 3963->3966 3967 401073 CreateBrushIndirect FillRect DeleteObject 3964->3967 3968 4010fc 3964->3968 3967->3964 3969 401102 CreateFontIndirectA 3968->3969 3970 401167 EndPaint 3968->3970 3969->3970 3971 401112 6 API calls 3969->3971 3970->3966 3971->3970 3972 402303 3973 402309 3972->3973 3974 4029f6 18 API calls 3973->3974 3975 40231b 3974->3975 3976 4029f6 18 API calls 3975->3976 3977 402325 RegCreateKeyExA 3976->3977 3978 40288b 3977->3978 3979 40234f 3977->3979 3980 402367 3979->3980 3981 4029f6 18 API calls 3979->3981 3982 402373 3980->3982 3984 4029d9 18 API calls 3980->3984 3983 402360 lstrlenA 3981->3983 3985 40238e RegSetValueExA 3982->3985 3987 402f18 48 API calls 3982->3987 3983->3980 3984->3982 3986 4023a4 RegCloseKey 3985->3986 3986->3978 3987->3985 3989 402803 3990 4029d9 18 API calls 3989->3990 3991 402809 3990->3991 3992 40265c 3991->3992 3993 40283a 3991->3993 3995 402817 3991->3995 3993->3992 3994 405b88 18 API calls 3993->3994 3994->3992 3995->3992 3997 405ac4 wsprintfA 3995->3997 3997->3992 3998 401b06 3999 401b13 3998->3999 4000 401b57 3998->4000 4001 4021fb 3999->4001 4009 401b2a 3999->4009 4002 401b80 GlobalAlloc 4000->4002 4003 401b5b 4000->4003 4006 405b88 18 API calls 4001->4006 4005 405b88 18 API calls 4002->4005 4004 401b9b 4003->4004 4019 405b66 lstrcpynA 4003->4019 4005->4004 4008 402208 4006->4008 4012 405427 MessageBoxIndirectA 4008->4012 4017 405b66 lstrcpynA 4009->4017 4010 401b6d GlobalFree 4010->4004 4012->4004 4013 401b39 4018 405b66 lstrcpynA 4013->4018 4015 401b48 4020 405b66 lstrcpynA 4015->4020 4017->4013 4018->4015 4019->4010 4020->4004 4021 402506 4022 4029d9 18 API calls 4021->4022 4025 402510 4022->4025 4023 402586 4024 402544 ReadFile 4024->4023 4024->4025 4025->4023 4025->4024 4026 402588 4025->4026 4027 402598 4025->4027 4030 405ac4 wsprintfA 4026->4030 4027->4023 4029 4025ae SetFilePointer 4027->4029 4029->4023 4030->4023 4031 401c8a 4032 4029d9 18 API calls 4031->4032 4033 401c91 4032->4033 4034 4029d9 18 API calls 4033->4034 4035 401c99 GetDlgItem 4034->4035 4036 4024b8 4035->4036 4037 40468b 4038 4046b7 4037->4038 4039 40469b 4037->4039 4041 4046ea 4038->4041 4042 4046bd SHGetPathFromIDListA 4038->4042 4048 40540b GetDlgItemTextA 4039->4048 4044 4046d4 SendMessageA 4042->4044 4045 4046cd 4042->4045 4043 4046a8 SendMessageA 4043->4038 4044->4041 4046 40140b 2 API calls 4045->4046 4046->4044 4048->4043 4055 40430f 4056 404345 4055->4056 4057 40431f 4055->4057 4059 403f7f 8 API calls 4056->4059 4058 403f18 19 API calls 4057->4058 4060 40432c SetDlgItemTextA 4058->4060 4061 404351 4059->4061 4060->4056 4062 401490 4063 404f04 25 API calls 4062->4063 4064 401497 4063->4064 4065 402615 4066 402618 4065->4066 4067 402630 4065->4067 4068 402625 FindNextFileA 4066->4068 4068->4067 4069 40266f 4068->4069 4071 405b66 lstrcpynA 4069->4071 4071->4067 4079 401595 4080 4029f6 18 API calls 4079->4080 4081 40159c SetFileAttributesA 4080->4081 4082 4015ae 4081->4082 4083 401d95 4084 4029d9 18 API calls 4083->4084 4085 401d9b 4084->4085 4086 4029d9 18 API calls 4085->4086 4087 401da4 4086->4087 4088 401db6 EnableWindow 4087->4088 4089 401dab ShowWindow 4087->4089 4090 40288b 4088->4090 4089->4090 4091 401e95 4092 4029f6 18 API calls 4091->4092 4093 401e9c 4092->4093 4094 405e61 2 API calls 4093->4094 4095 401ea2 4094->4095 4097 401eb4 4095->4097 4098 405ac4 wsprintfA 4095->4098 4098->4097 4099 401696 4100 4029f6 18 API calls 4099->4100 4101 40169c GetFullPathNameA 4100->4101 4102 4016b3 4101->4102 4103 4016d4 4101->4103 4102->4103 4106 405e61 2 API calls 4102->4106 4104 4016e8 GetShortPathNameA 4103->4104 4105 40288b 4103->4105 4104->4105 4107 4016c4 4106->4107 4107->4103 4109 405b66 lstrcpynA 4107->4109 4109->4103 4110 401d1b GetDC GetDeviceCaps 4111 4029d9 18 API calls 4110->4111 4112 401d37 MulDiv 4111->4112 4113 4029d9 18 API calls 4112->4113 4114 401d4c 4113->4114 4115 405b88 18 API calls 4114->4115 4116 401d85 CreateFontIndirectA 4115->4116 4117 4024b8 4116->4117 4118 401e1b 4119 4029f6 18 API calls 4118->4119 4120 401e21 4119->4120 4121 404f04 25 API calls 4120->4121 4122 401e2b 4121->4122 4123 4053c6 2 API calls 4122->4123 4126 401e31 4123->4126 4124 401e87 CloseHandle 4128 40265c 4124->4128 4125 401e50 WaitForSingleObject 4125->4126 4127 401e5e GetExitCodeProcess 4125->4127 4126->4124 4126->4125 4126->4128 4131 405ec1 2 API calls 4126->4131 4129 401e70 4127->4129 4130 401e79 4127->4130 4133 405ac4 wsprintfA 4129->4133 4130->4124 4131->4125 4133->4130 4134 40249c 4135 4029f6 18 API calls 4134->4135 4136 4024a3 4135->4136 4139 40583d GetFileAttributesA CreateFileA 4136->4139 4138 4024af 4139->4138 4140 402020 4141 4029f6 18 API calls 4140->4141 4142 402027 4141->4142 4143 4029f6 18 API calls 4142->4143 4144 402031 4143->4144 4145 4029f6 18 API calls 4144->4145 4146 40203a 4145->4146 4147 4029f6 18 API calls 4146->4147 4148 402044 4147->4148 4149 4029f6 18 API calls 4148->4149 4151 40204e 4149->4151 4150 402062 CoCreateInstance 4153 402081 4150->4153 4154 402137 4150->4154 4151->4150 4152 4029f6 18 API calls 4151->4152 4152->4150 4153->4154 4157 402116 MultiByteToWideChar 4153->4157 4155 401423 25 API calls 4154->4155 4156 402169 4154->4156 4155->4156 4157->4154 4158 401721 4159 4029f6 18 API calls 4158->4159 4160 401728 4159->4160 4161 40586c 2 API calls 4160->4161 4162 40172f 4161->4162 4162->4162 4163 401922 4164 4029f6 18 API calls 4163->4164 4165 401929 lstrlenA 4164->4165 4166 4024b8 4165->4166 4167 402223 4168 40222b 4167->4168 4170 402231 4167->4170 4169 4029f6 18 API calls 4168->4169 4169->4170 4171 4029f6 18 API calls 4170->4171 4172 402241 4170->4172 4171->4172 4173 4029f6 18 API calls 4172->4173 4175 40224f 4172->4175 4173->4175 4174 4029f6 18 API calls 4176 402258 WritePrivateProfileStringA 4174->4176 4175->4174 4184 401ca5 4185 4029d9 18 API calls 4184->4185 4186 401cb5 SetWindowLongA 4185->4186 4187 40288b 4186->4187 4188 401a26 4189 4029d9 18 API calls 4188->4189 4190 401a2c 4189->4190 4191 4029d9 18 API calls 4190->4191 4192 4019d6 4191->4192 4193 402427 4203 402b00 4193->4203 4195 402431 4196 4029d9 18 API calls 4195->4196 4197 40243a 4196->4197 4198 402451 RegEnumKeyA 4197->4198 4199 40245d RegEnumValueA 4197->4199 4201 40265c 4197->4201 4200 402476 RegCloseKey 4198->4200 4199->4200 4199->4201 4200->4201 4204 4029f6 18 API calls 4203->4204 4205 402b19 4204->4205 4206 402b27 RegOpenKeyExA 4205->4206 4206->4195 4207 4022a7 4208 4022d7 4207->4208 4209 4022ac 4207->4209 4210 4029f6 18 API calls 4208->4210 4211 402b00 19 API calls 4209->4211 4212 4022de 4210->4212 4213 4022b3 4211->4213 4218 402a36 RegOpenKeyExA 4212->4218 4214 4029f6 18 API calls 4213->4214 4217 4022f4 4213->4217 4215 4022c4 RegDeleteValueA RegCloseKey 4214->4215 4215->4217 4219 402aad 4218->4219 4222 402a61 4218->4222 4219->4217 4220 402a87 RegEnumKeyA 4221 402a99 RegCloseKey 4220->4221 4220->4222 4223 405e88 3 API calls 4221->4223 4222->4220 4222->4221 4224 402abe RegCloseKey 4222->4224 4226 402a36 3 API calls 4222->4226 4225 402aa9 4223->4225 4224->4219 4225->4219 4227 402ad9 RegDeleteKeyA 4225->4227 4226->4222 4227->4219 4228 40402c lstrcpynA lstrlenA 4229 401bad 4230 4029d9 18 API calls 4229->4230 4231 401bb4 4230->4231 4232 4029d9 18 API calls 4231->4232 4233 401bbe 4232->4233 4234 401bce 4233->4234 4235 4029f6 18 API calls 4233->4235 4236 401bde 4234->4236 4237 4029f6 18 API calls 4234->4237 4235->4234 4238 401be9 4236->4238 4239 401c2d 4236->4239 4237->4236 4241 4029d9 18 API calls 4238->4241 4240 4029f6 18 API calls 4239->4240 4242 401c32 4240->4242 4243 401bee 4241->4243 4244 4029f6 18 API calls 4242->4244 4245 4029d9 18 API calls 4243->4245 4246 401c3b FindWindowExA 4244->4246 4247 401bf7 4245->4247 4250 401c59 4246->4250 4248 401c1d SendMessageA 4247->4248 4249 401bff SendMessageTimeoutA 4247->4249 4248->4250 4249->4250 4251 4023af 4252 402b00 19 API calls 4251->4252 4253 4023b9 4252->4253 4254 4029f6 18 API calls 4253->4254 4255 4023c2 4254->4255 4256 4023cc RegQueryValueExA 4255->4256 4260 40265c 4255->4260 4257 4023f2 RegCloseKey 4256->4257 4258 4023ec 4256->4258 4257->4260 4258->4257 4262 405ac4 wsprintfA 4258->4262 4262->4257 4263 406131 4264 405fb5 4263->4264 4265 406920 4264->4265 4266 406036 GlobalFree 4264->4266 4267 40603f GlobalAlloc 4264->4267 4268 4060b6 GlobalAlloc 4264->4268 4269 4060ad GlobalFree 4264->4269 4266->4267 4267->4264 4267->4265 4268->4264 4268->4265 4269->4268 4270 4015b3 4271 4029f6 18 API calls 4270->4271 4272 4015ba 4271->4272 4273 4056ed 4 API calls 4272->4273 4285 4015c2 4273->4285 4274 40160a 4275 40162d 4274->4275 4276 40160f 4274->4276 4281 401423 25 API calls 4275->4281 4278 401423 25 API calls 4276->4278 4277 405684 CharNextA 4279 4015d0 CreateDirectoryA 4277->4279 4280 401616 4278->4280 4282 4015e5 GetLastError 4279->4282 4279->4285 4288 405b66 lstrcpynA 4280->4288 4287 402169 4281->4287 4284 4015f2 GetFileAttributesA 4282->4284 4282->4285 4284->4285 4285->4274 4285->4277 4286 401621 SetCurrentDirectoryA 4286->4287 4288->4286 4289 401634 4290 4029f6 18 API calls 4289->4290 4291 40163a 4290->4291 4292 405e61 2 API calls 4291->4292 4293 401640 4292->4293 4294 401734 4295 4029f6 18 API calls 4294->4295 4296 40173b 4295->4296 4297 401761 4296->4297 4298 401759 4296->4298 4333 405b66 lstrcpynA 4297->4333 4332 405b66 lstrcpynA 4298->4332 4301 40175f 4305 405dc8 5 API calls 4301->4305 4302 40176c 4303 405659 3 API calls 4302->4303 4304 401772 lstrcatA 4303->4304 4304->4301 4307 40177e 4305->4307 4306 405e61 2 API calls 4306->4307 4307->4306 4308 40581e 2 API calls 4307->4308 4310 401795 CompareFileTime 4307->4310 4311 401859 4307->4311 4312 401830 4307->4312 4315 405b66 lstrcpynA 4307->4315 4320 405b88 18 API calls 4307->4320 4329 405427 MessageBoxIndirectA 4307->4329 4334 40583d GetFileAttributesA CreateFileA 4307->4334 4308->4307 4310->4307 4313 404f04 25 API calls 4311->4313 4314 404f04 25 API calls 4312->4314 4322 401845 4312->4322 4316 401863 4313->4316 4314->4322 4315->4307 4317 402f18 48 API calls 4316->4317 4318 401876 4317->4318 4319 40188a SetFileTime 4318->4319 4321 40189c CloseHandle 4318->4321 4319->4321 4320->4307 4321->4322 4323 4018ad 4321->4323 4324 4018b2 4323->4324 4325 4018c5 4323->4325 4327 405b88 18 API calls 4324->4327 4326 405b88 18 API calls 4325->4326 4328 4018cd 4326->4328 4330 4018ba lstrcatA 4327->4330 4331 405427 MessageBoxIndirectA 4328->4331 4329->4307 4330->4328 4331->4322 4332->4301 4333->4302 4334->4307 4335 401934 4336 4029d9 18 API calls 4335->4336 4337 40193b 4336->4337 4338 4029d9 18 API calls 4337->4338 4339 401945 4338->4339 4340 4029f6 18 API calls 4339->4340 4341 40194e 4340->4341 4342 401961 lstrlenA 4341->4342 4343 40199c 4341->4343 4344 40196b 4342->4344 4344->4343 4348 405b66 lstrcpynA 4344->4348 4346 401985 4346->4343 4347 401992 lstrlenA 4346->4347 4347->4343 4348->4346 4349 4019b5 4350 4029f6 18 API calls 4349->4350 4351 4019bc 4350->4351 4352 4029f6 18 API calls 4351->4352 4353 4019c5 4352->4353 4354 4019cc lstrcmpiA 4353->4354 4355 4019de lstrcmpA 4353->4355 4356 4019d2 4354->4356 4355->4356 4357 4014b7 4358 4014bd 4357->4358 4359 401389 2 API calls 4358->4359 4360 4014c5 4359->4360 4368 402b3b 4369 402b63 4368->4369 4370 402b4a SetTimer 4368->4370 4371 402bb1 4369->4371 4372 402bb7 MulDiv 4369->4372 4370->4369 4373 402b71 wsprintfA SetWindowTextA SetDlgItemTextA 4372->4373 4373->4371 2925 40323c #17 SetErrorMode OleInitialize 2995 405e88 GetModuleHandleA 2925->2995 2929 4032aa GetCommandLineA 3000 405b66 lstrcpynA 2929->3000 2931 4032bc GetModuleHandleA 2932 4032d3 2931->2932 3001 405684 2932->3001 2935 40335d 2936 403370 GetTempPathA 2935->2936 3005 403208 2936->3005 2938 403386 2939 4033aa DeleteFileA 2938->2939 2940 40338a GetWindowsDirectoryA lstrcatA 2938->2940 3013 402c72 GetTickCount GetModuleFileNameA 2939->3013 2942 403208 11 API calls 2940->2942 2941 405684 CharNextA 2945 4032f4 2941->2945 2944 4033a6 2942->2944 2944->2939 2948 403428 ExitProcess CoUninitialize 2944->2948 2945->2935 2945->2941 2946 40335f 2945->2946 3095 405b66 lstrcpynA 2946->3095 2947 4033bb 2947->2948 2950 403414 2947->2950 2955 405684 CharNextA 2947->2955 2951 403522 2948->2951 2952 40343d 2948->2952 3112 4036af 2950->3112 2953 4035a5 ExitProcess 2951->2953 2957 405e88 3 API calls 2951->2957 3166 405427 2952->3166 2960 4033d2 2955->2960 2962 403531 2957->2962 2958 403424 2958->2948 2964 403453 lstrcatA lstrcmpiA 2960->2964 2965 4033ef 2960->2965 2963 405e88 3 API calls 2962->2963 2966 40353a 2963->2966 2964->2948 2967 40346f CreateDirectoryA SetCurrentDirectoryA 2964->2967 3096 40573a 2965->3096 2969 405e88 3 API calls 2966->2969 2970 403491 2967->2970 2971 403486 2967->2971 2973 403543 2969->2973 3043 405b66 lstrcpynA 2970->3043 3170 405b66 lstrcpynA 2971->3170 2976 403591 ExitWindowsEx 2973->2976 2979 403551 GetCurrentProcess 2973->2979 2976->2953 2978 40359e 2976->2978 3171 40140b 2978->3171 2984 403561 2979->2984 2980 403409 3111 405b66 lstrcpynA 2980->3111 2984->2976 2986 4034ce CopyFileA 2992 40349f 2986->2992 2987 403516 2988 4058b4 39 API calls 2987->2988 2990 40351d 2988->2990 2990->2948 2991 405b88 18 API calls 2991->2992 2992->2987 2992->2991 2994 403502 CloseHandle 2992->2994 3044 405b88 2992->3044 3063 4058b4 2992->3063 3092 4053c6 CreateProcessA 2992->3092 2994->2992 2996 405ea4 LoadLibraryA 2995->2996 2997 405eaf GetProcAddress 2995->2997 2996->2997 2998 40327f SHGetFileInfoA 2996->2998 2997->2998 2999 405b66 lstrcpynA 2998->2999 2999->2929 3000->2931 3002 40568a 3001->3002 3003 4032e7 CharNextA 3002->3003 3004 405690 CharNextA 3002->3004 3003->2945 3004->3002 3174 405dc8 3005->3174 3007 403214 3008 40321e 3007->3008 3183 405659 lstrlenA CharPrevA 3007->3183 3008->2938 3190 40583d GetFileAttributesA CreateFileA 3013->3190 3015 402cb5 3042 402cc2 3015->3042 3191 405b66 lstrcpynA 3015->3191 3017 402cd8 3192 4056a0 lstrlenA 3017->3192 3021 402ce9 GetFileSize 3022 402dea 3021->3022 3032 402d00 3021->3032 3199 402bd3 3022->3199 3026 402e2d GlobalAlloc 3029 402e44 3026->3029 3027 402e85 3030 402bd3 33 API calls 3027->3030 3035 40586c 2 API calls 3029->3035 3030->3042 3031 402e0e 3033 4031bf ReadFile 3031->3033 3032->3022 3032->3027 3034 402bd3 33 API calls 3032->3034 3032->3042 3197 4031bf ReadFile 3032->3197 3036 402e19 3033->3036 3034->3032 3037 402e55 CreateFileA 3035->3037 3036->3026 3036->3042 3038 402e8f 3037->3038 3037->3042 3215 4031f1 SetFilePointer 3038->3215 3040 402e9d 3216 402f18 3040->3216 3042->2947 3043->2992 3056 405b95 3044->3056 3045 405daf 3046 4034c1 DeleteFileA 3045->3046 3279 405b66 lstrcpynA 3045->3279 3046->2986 3046->2992 3048 405c2d GetVersion 3058 405c3a 3048->3058 3049 405d86 lstrlenA 3049->3056 3050 405b88 10 API calls 3050->3049 3053 405ca5 GetSystemDirectoryA 3053->3058 3055 405cb8 GetWindowsDirectoryA 3055->3058 3056->3045 3056->3048 3056->3049 3056->3050 3057 405dc8 5 API calls 3056->3057 3277 405ac4 wsprintfA 3056->3277 3278 405b66 lstrcpynA 3056->3278 3057->3056 3058->3053 3058->3055 3058->3056 3059 405b88 10 API calls 3058->3059 3060 405d2f lstrcatA 3058->3060 3061 405cec SHGetSpecialFolderLocation 3058->3061 3272 405a4d RegOpenKeyExA 3058->3272 3059->3058 3060->3056 3061->3058 3062 405d04 SHGetPathFromIDListA CoTaskMemFree 3061->3062 3062->3058 3064 405e88 3 API calls 3063->3064 3065 4058bf 3064->3065 3066 4058c7 MoveFileExA 3065->3066 3067 4058d8 3065->3067 3066->3067 3068 405a11 3066->3068 3069 4058f6 3067->3069 3070 40591c GetShortPathNameA 3067->3070 3068->2992 3280 40583d GetFileAttributesA CreateFileA 3069->3280 3070->3068 3071 405931 3070->3071 3071->3068 3074 405939 wsprintfA 3071->3074 3073 405900 CloseHandle GetShortPathNameA 3073->3068 3075 405914 3073->3075 3076 405b88 18 API calls 3074->3076 3075->3068 3075->3070 3077 405961 3076->3077 3281 40583d GetFileAttributesA CreateFileA 3077->3281 3079 40596e 3079->3068 3080 40597d GetFileSize GlobalAlloc 3079->3080 3081 405a0a CloseHandle 3080->3081 3082 40599b ReadFile 3080->3082 3081->3068 3082->3081 3083 4059af 3082->3083 3083->3081 3282 4057b2 lstrlenA 3083->3282 3086 4059c4 3287 405b66 lstrcpynA 3086->3287 3087 405a1e 3089 4057b2 4 API calls 3087->3089 3090 4059d2 3089->3090 3091 4059e5 SetFilePointer WriteFile GlobalFree 3090->3091 3091->3081 3093 405401 3092->3093 3094 4053f5 CloseHandle 3092->3094 3093->2992 3094->3093 3095->2936 3288 405b66 lstrcpynA 3096->3288 3098 40574b 3289 4056ed CharNextA CharNextA 3098->3289 3101 4033fa 3101->2948 3110 405b66 lstrcpynA 3101->3110 3102 405dc8 5 API calls 3108 405761 3102->3108 3103 40578c lstrlenA 3104 405797 3103->3104 3103->3108 3105 405659 3 API calls 3104->3105 3107 40579c GetFileAttributesA 3105->3107 3107->3101 3108->3101 3108->3103 3109 4056a0 2 API calls 3108->3109 3295 405e61 FindFirstFileA 3108->3295 3109->3103 3110->2980 3111->2950 3113 405e88 3 API calls 3112->3113 3114 4036c3 3113->3114 3115 4036c9 3114->3115 3116 4036db 3114->3116 3298 405ac4 wsprintfA 3115->3298 3117 405a4d 3 API calls 3116->3117 3118 4036fc 3117->3118 3119 40371a lstrcatA 3118->3119 3122 405a4d 3 API calls 3118->3122 3121 4036d9 3119->3121 3299 403978 3121->3299 3122->3119 3125 40573a 18 API calls 3126 40374c 3125->3126 3127 4037d5 3126->3127 3130 405a4d 3 API calls 3126->3130 3128 40573a 18 API calls 3127->3128 3129 4037db 3128->3129 3131 4037eb LoadImageA 3129->3131 3133 405b88 18 API calls 3129->3133 3132 403778 3130->3132 3134 403816 RegisterClassA 3131->3134 3135 40389f 3131->3135 3132->3127 3136 403794 lstrlenA 3132->3136 3139 405684 CharNextA 3132->3139 3133->3131 3137 403852 SystemParametersInfoA CreateWindowExA 3134->3137 3163 4038a9 3134->3163 3138 40140b 2 API calls 3135->3138 3140 4037a2 lstrcmpiA 3136->3140 3141 4037c8 3136->3141 3137->3135 3142 4038a5 3138->3142 3143 403792 3139->3143 3140->3141 3144 4037b2 GetFileAttributesA 3140->3144 3145 405659 3 API calls 3141->3145 3147 403978 19 API calls 3142->3147 3142->3163 3143->3136 3146 4037be 3144->3146 3148 4037ce 3145->3148 3146->3141 3149 4056a0 2 API calls 3146->3149 3150 4038b6 3147->3150 3308 405b66 lstrcpynA 3148->3308 3149->3141 3152 4038c2 ShowWindow LoadLibraryA 3150->3152 3153 403945 3150->3153 3155 4038e1 LoadLibraryA 3152->3155 3156 4038e8 GetClassInfoA 3152->3156 3309 404fd6 OleInitialize 3153->3309 3155->3156 3157 403912 DialogBoxParamA 3156->3157 3158 4038fc GetClassInfoA RegisterClassA 3156->3158 3160 40140b 2 API calls 3157->3160 3158->3157 3159 40394b 3161 403967 3159->3161 3162 40394f 3159->3162 3160->3163 3164 40140b 2 API calls 3161->3164 3162->3163 3165 40140b 2 API calls 3162->3165 3163->2958 3164->3163 3165->3163 3169 40543c 3166->3169 3167 40344b ExitProcess 3168 405450 MessageBoxIndirectA 3168->3167 3169->3167 3169->3168 3170->2970 3172 401389 2 API calls 3171->3172 3173 401420 3172->3173 3173->2953 3180 405dd4 3174->3180 3175 405e3c 3176 405e40 CharPrevA 3175->3176 3179 405e5b 3175->3179 3176->3175 3177 405e31 CharNextA 3177->3175 3177->3180 3178 405684 CharNextA 3178->3180 3179->3007 3180->3175 3180->3177 3180->3178 3181 405e1f CharNextA 3180->3181 3182 405e2c CharNextA 3180->3182 3181->3180 3182->3177 3184 405673 lstrcatA 3183->3184 3185 403226 CreateDirectoryA 3183->3185 3184->3185 3186 40586c 3185->3186 3187 405877 GetTickCount GetTempFileNameA 3186->3187 3188 40323a 3187->3188 3189 4058a3 3187->3189 3188->2938 3189->3187 3189->3188 3190->3015 3191->3017 3193 4056ad 3192->3193 3194 4056b2 CharPrevA 3193->3194 3195 402cde 3193->3195 3194->3193 3194->3195 3196 405b66 lstrcpynA 3195->3196 3196->3021 3198 4031e0 3197->3198 3198->3032 3200 402be1 3199->3200 3201 402bf9 3199->3201 3202 402bea DestroyWindow 3200->3202 3207 402bf1 3200->3207 3203 402c01 3201->3203 3204 402c09 GetTickCount 3201->3204 3202->3207 3233 405ec1 3203->3233 3206 402c17 3204->3206 3204->3207 3208 402c4c CreateDialogParamA ShowWindow 3206->3208 3209 402c1f 3206->3209 3207->3026 3207->3042 3214 4031f1 SetFilePointer 3207->3214 3208->3207 3209->3207 3237 402bb7 3209->3237 3211 402c2d wsprintfA 3240 404f04 3211->3240 3214->3031 3215->3040 3217 402f45 3216->3217 3218 402f29 SetFilePointer 3216->3218 3251 403043 GetTickCount 3217->3251 3218->3217 3221 402f56 ReadFile 3222 402f76 3221->3222 3223 403028 3221->3223 3222->3223 3224 403043 43 API calls 3222->3224 3223->3042 3225 402f8d 3224->3225 3225->3223 3226 403008 ReadFile 3225->3226 3227 402f9d 3225->3227 3226->3223 3227->3223 3229 402fb8 ReadFile 3227->3229 3232 402fb5 3227->3232 3229->3223 3229->3232 3230 402fd1 WriteFile 3231 403002 3230->3231 3230->3232 3231->3223 3232->3223 3232->3227 3232->3229 3232->3230 3232->3231 3234 405ede PeekMessageA 3233->3234 3235 405ed4 DispatchMessageA 3234->3235 3236 405eee 3234->3236 3235->3234 3236->3207 3238 402bc6 3237->3238 3239 402bc8 MulDiv 3237->3239 3238->3239 3239->3211 3241 402c4a 3240->3241 3242 404f1f 3240->3242 3241->3207 3243 404f3c lstrlenA 3242->3243 3244 405b88 18 API calls 3242->3244 3245 404f65 3243->3245 3246 404f4a lstrlenA 3243->3246 3244->3243 3248 404f78 3245->3248 3249 404f6b SetWindowTextA 3245->3249 3246->3241 3247 404f5c lstrcatA 3246->3247 3247->3245 3248->3241 3250 404f7e SendMessageA SendMessageA SendMessageA 3248->3250 3249->3248 3250->3241 3252 403072 3251->3252 3253 4031ad 3251->3253 3264 4031f1 SetFilePointer 3252->3264 3254 402bd3 33 API calls 3253->3254 3260 402f4e 3254->3260 3256 40307d SetFilePointer 3262 4030a2 3256->3262 3257 4031bf ReadFile 3257->3262 3259 402bd3 33 API calls 3259->3262 3260->3221 3260->3223 3261 403137 WriteFile 3261->3260 3261->3262 3262->3257 3262->3259 3262->3260 3262->3261 3263 40318e SetFilePointer 3262->3263 3265 405f82 3262->3265 3263->3253 3264->3256 3266 405fa7 3265->3266 3267 405faf 3265->3267 3266->3262 3267->3266 3268 406036 GlobalFree 3267->3268 3269 40603f GlobalAlloc 3267->3269 3270 4060b6 GlobalAlloc 3267->3270 3271 4060ad GlobalFree 3267->3271 3268->3269 3269->3266 3269->3267 3270->3266 3270->3267 3271->3270 3273 405a80 RegQueryValueExA 3272->3273 3274 405abe 3272->3274 3275 405aa1 RegCloseKey 3273->3275 3274->3058 3275->3274 3277->3056 3278->3056 3279->3046 3280->3073 3281->3079 3283 4057e8 lstrlenA 3282->3283 3284 4057f2 3283->3284 3285 4057c6 lstrcmpiA 3283->3285 3284->3086 3284->3087 3285->3284 3286 4057df CharNextA 3285->3286 3286->3283 3287->3090 3288->3098 3290 405707 3289->3290 3294 405713 3289->3294 3291 40570e CharNextA 3290->3291 3290->3294 3292 405730 3291->3292 3292->3101 3292->3102 3293 405684 CharNextA 3293->3294 3294->3292 3294->3293 3296 405e82 3295->3296 3297 405e77 FindClose 3295->3297 3296->3108 3297->3296 3298->3121 3300 40398c 3299->3300 3316 405ac4 wsprintfA 3300->3316 3302 4039fd 3303 405b88 18 API calls 3302->3303 3304 403a09 SetWindowTextA 3303->3304 3305 40372a 3304->3305 3306 403a25 3304->3306 3305->3125 3306->3305 3307 405b88 18 API calls 3306->3307 3307->3306 3308->3127 3317 403f64 3309->3317 3311 404ff9 3315 405020 3311->3315 3320 401389 3311->3320 3312 403f64 SendMessageA 3313 405032 OleUninitialize 3312->3313 3313->3159 3315->3312 3316->3302 3318 403f7c 3317->3318 3319 403f6d SendMessageA 3317->3319 3318->3311 3319->3318 3322 401390 3320->3322 3321 4013fe 3321->3311 3322->3321 3323 4013cb MulDiv SendMessageA 3322->3323 3323->3322 3324 4035bd 3325 4035d8 3324->3325 3326 4035ce CloseHandle 3324->3326 3327 4035e2 CloseHandle 3325->3327 3328 4035ec 3325->3328 3326->3325 3327->3328 3333 40361a 3328->3333 3334 403628 3333->3334 3335 4035f1 3334->3335 3336 40362d FreeLibrary GlobalFree 3334->3336 3337 40548b 3335->3337 3336->3335 3336->3336 3338 40573a 18 API calls 3337->3338 3339 40549f 3338->3339 3340 4054a8 DeleteFileA 3339->3340 3341 4054bf 3339->3341 3370 4035fd 3340->3370 3342 4055f4 3341->3342 3375 405b66 lstrcpynA 3341->3375 3348 405e61 2 API calls 3342->3348 3342->3370 3344 4054e9 3345 4054fa 3344->3345 3346 4054ed lstrcatA 3344->3346 3347 4056a0 2 API calls 3345->3347 3349 405500 3346->3349 3347->3349 3351 405619 3348->3351 3350 40550e lstrcatA 3349->3350 3352 405519 lstrlenA FindFirstFileA 3349->3352 3350->3352 3353 405659 3 API calls 3351->3353 3351->3370 3352->3342 3362 40553d 3352->3362 3355 405623 3353->3355 3354 405684 CharNextA 3354->3362 3356 40581e 2 API calls 3355->3356 3357 405629 RemoveDirectoryA 3356->3357 3358 405634 3357->3358 3359 40564b 3357->3359 3364 404f04 25 API calls 3358->3364 3358->3370 3360 404f04 25 API calls 3359->3360 3360->3370 3361 4055d3 FindNextFileA 3361->3362 3365 4055eb FindClose 3361->3365 3362->3354 3362->3361 3369 40548b 60 API calls 3362->3369 3372 404f04 25 API calls 3362->3372 3373 404f04 25 API calls 3362->3373 3374 4058b4 39 API calls 3362->3374 3376 405b66 lstrcpynA 3362->3376 3377 40581e GetFileAttributesA 3362->3377 3366 405642 3364->3366 3365->3342 3367 4058b4 39 API calls 3366->3367 3367->3370 3369->3362 3372->3361 3373->3362 3374->3362 3375->3344 3376->3362 3378 4055a0 DeleteFileA 3377->3378 3379 40582d SetFileAttributesA 3377->3379 3378->3362 3379->3378 4375 40263e 4376 4029f6 18 API calls 4375->4376 4377 402645 FindFirstFileA 4376->4377 4378 402668 4377->4378 4379 402658 4377->4379 4381 40266f 4378->4381 4383 405ac4 wsprintfA 4378->4383 4384 405b66 lstrcpynA 4381->4384 4383->4381 4384->4379 4385 4024be 4386 4024c3 4385->4386 4387 4024d4 4385->4387 4388 4029d9 18 API calls 4386->4388 4389 4029f6 18 API calls 4387->4389 4391 4024ca 4388->4391 4390 4024db lstrlenA 4389->4390 4390->4391 4392 4024fa WriteFile 4391->4392 4393 40265c 4391->4393 4392->4393

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 0 40323c-4032d1 #17 SetErrorMode OleInitialize call 405e88 SHGetFileInfoA call 405b66 GetCommandLineA call 405b66 GetModuleHandleA 7 4032d3-4032d8 0->7 8 4032dd-4032f2 call 405684 CharNextA 0->8 7->8 11 403357-40335b 8->11 12 4032f4-4032f7 11->12 13 40335d 11->13 14 4032f9-4032fd 12->14 15 4032ff-403307 12->15 16 403370-403388 GetTempPathA call 403208 13->16 14->14 14->15 18 403309-40330a 15->18 19 40330f-403312 15->19 25 4033aa-4033c1 DeleteFileA call 402c72 16->25 26 40338a-4033a8 GetWindowsDirectoryA lstrcatA call 403208 16->26 18->19 20 403314-403318 19->20 21 403347-403354 call 405684 19->21 23 403328-40332e 20->23 24 40331a-403323 20->24 21->11 38 403356 21->38 30 403330-403339 23->30 31 40333e-403345 23->31 24->23 28 403325 24->28 39 403428-403437 ExitProcess CoUninitialize 25->39 40 4033c3-4033c9 25->40 26->25 26->39 28->23 30->31 35 40333b 30->35 31->21 36 40335f-40336b call 405b66 31->36 35->31 36->16 38->11 44 403522-403528 39->44 45 40343d-40344d call 405427 ExitProcess 39->45 42 403418-403424 call 4036af 40->42 43 4033cb-4033d4 call 405684 40->43 42->39 58 4033df-4033e1 43->58 46 4035a5-4035ad 44->46 47 40352a-403547 call 405e88 * 3 44->47 53 4035b3-4035b7 ExitProcess 46->53 54 4035af 46->54 76 403591-40359c ExitWindowsEx 47->76 77 403549-40354b 47->77 54->53 60 4033e3-4033ed 58->60 61 4033d6-4033dc 58->61 62 403453-40346d lstrcatA lstrcmpiA 60->62 63 4033ef-4033fc call 40573a 60->63 61->60 65 4033de 61->65 62->39 66 40346f-403484 CreateDirectoryA SetCurrentDirectoryA 62->66 63->39 74 4033fe-403414 call 405b66 * 2 63->74 65->58 69 403491-4034ab call 405b66 66->69 70 403486-40348c call 405b66 66->70 84 4034b0-4034cc call 405b88 DeleteFileA 69->84 70->69 74->42 76->46 80 40359e-4035a0 call 40140b 76->80 77->76 81 40354d-40354f 77->81 80->46 81->76 82 403551-403563 GetCurrentProcess 81->82 82->76 91 403565-403587 82->91 92 40350d-403514 84->92 93 4034ce-4034de CopyFileA 84->93 91->76 92->84 94 403516-40351d call 4058b4 92->94 93->92 95 4034e0-4034f9 call 4058b4 call 405b88 call 4053c6 93->95 94->39 104 4034fe-403500 95->104 104->92 105 403502-403509 CloseHandle 104->105 105->92
                            APIs
                            • #17.COMCTL32 ref: 0040325B
                            • SetErrorMode.KERNELBASE(00008001), ref: 00403266
                            • OleInitialize.OLE32(00000000), ref: 0040326D
                              • Part of subcall function 00405E88: GetModuleHandleA.KERNEL32(?,?,00000000,0040327F,00000008), ref: 00405E9A
                              • Part of subcall function 00405E88: LoadLibraryA.KERNELBASE(?,?,00000000,0040327F,00000008), ref: 00405EA5
                              • Part of subcall function 00405E88: GetProcAddress.KERNEL32(00000000,?), ref: 00405EB6
                            • SHGetFileInfoA.SHELL32(00429C58,00000000,?,00000160,00000000,00000008), ref: 00403295
                              • Part of subcall function 00405B66: lstrcpynA.KERNEL32(?,?,00002000,004032AA,00442EA0,NSIS Error), ref: 00405B73
                            • GetCommandLineA.KERNEL32(00442EA0,NSIS Error), ref: 004032AA
                            • GetModuleHandleA.KERNEL32(00000000,0046F000,00000000), ref: 004032BD
                            • CharNextA.USER32(00000000,0046F000,00000020), ref: 004032E8
                            • GetTempPathA.KERNELBASE(00002000,00479000,00000000,00000020), ref: 0040337B
                            • GetWindowsDirectoryA.KERNEL32(00479000,00001FFB), ref: 00403390
                            • lstrcatA.KERNEL32(00479000,\Temp), ref: 0040339C
                            • DeleteFileA.KERNELBASE(00477000), ref: 004033AF
                            • ExitProcess.KERNEL32(00000000), ref: 00403428
                            • CoUninitialize.COMBASE(00000000), ref: 0040342D
                            • ExitProcess.KERNEL32 ref: 0040344D
                            • lstrcatA.KERNEL32(00479000,~nsu.tmp,0046F000,00000000,00000000), ref: 00403459
                            • lstrcmpiA.KERNEL32(00479000,00475000), ref: 00403465
                            • CreateDirectoryA.KERNELBASE(00479000,00000000), ref: 00403471
                            • SetCurrentDirectoryA.KERNELBASE(00479000), ref: 00403478
                            • DeleteFileA.KERNELBASE(C:\Users\user\AppData\Local\Temp\~nsu.tmp\Zu_.exe,C:\Users\user\AppData\Local\Temp\~nsu.tmp\Zu_.exe,?,00447000,?), ref: 004034C2
                            • CopyFileA.KERNEL32(0047D000,C:\Users\user\AppData\Local\Temp\~nsu.tmp\Zu_.exe,00000001), ref: 004034D6
                            • CloseHandle.KERNEL32(00000000,C:\Users\user\AppData\Local\Temp\~nsu.tmp\Zu_.exe,C:\Users\user\AppData\Local\Temp\~nsu.tmp\Zu_.exe,?,C:\Users\user\AppData\Local\Temp\~nsu.tmp\Zu_.exe,00000000), ref: 00403503
                            • GetCurrentProcess.KERNEL32(00000028,?,00000005,00000004,00000003), ref: 00403558
                            • ExitWindowsEx.USER32(00000002,00000000), ref: 00403594
                            • ExitProcess.KERNEL32 ref: 004035B7
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1722120987.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1722107573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722136817.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722230617.000000000052B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Uninstall.jbxd
                            Similarity
                            • API ID: ExitFileProcess$DirectoryHandle$CurrentDeleteModuleWindowslstrcat$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextPathProcTempUninitializelstrcmpilstrcpyn
                            • String ID: /D=$ _?=$"$C:\Users\user\AppData\Local\Temp\~nsu.tmp\Zu_.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$NCRC$NSIS Error$SeShutdownPrivilege$\Temp$~nsu.tmp
                            • API String ID: 553446912-3238908397
                            • Opcode ID: 09adc77615875cb99e1655232aa85b73943ac6b3ac0d2ef6babfe0bc3138c36e
                            • Instruction ID: b18730c7e9b155b38634e246beb7c9543dbde463d43dfe3db889f1e824801833
                            • Opcode Fuzzy Hash: 09adc77615875cb99e1655232aa85b73943ac6b3ac0d2ef6babfe0bc3138c36e
                            • Instruction Fuzzy Hash: 6B91C3319087417EE7216F619C49B6B7EACEB0134AF44453BF885B61E2C77C5A048B6F

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 280 406131-406136 281 4061a7-4061c5 280->281 282 406138-406167 280->282 283 40679d-4067b2 281->283 284 406169-40616c 282->284 285 40616e-406172 282->285 288 4067b4-4067ca 283->288 289 4067cc-4067e2 283->289 290 40617e-406181 284->290 286 406174-406178 285->286 287 40617a 285->287 286->290 287->290 291 4067e5-4067ec 288->291 289->291 292 406183-40618c 290->292 293 40619f-4061a2 290->293 297 406813-40681f 291->297 298 4067ee-4067f2 291->298 294 406191-40619d 292->294 295 40618e 292->295 296 406374-406392 293->296 302 406207-406235 294->302 295->294 299 406394-4063a8 296->299 300 4063aa-4063bc 296->300 306 405fb5-405fbe 297->306 303 4069a1-4069ab 298->303 304 4067f8-406810 298->304 305 4063bf-4063c9 299->305 300->305 308 406251-40626b 302->308 309 406237-40624f 302->309 307 4069b7-4069ca 303->307 304->297 312 4063cb 305->312 313 40636c-406372 305->313 310 405fc4 306->310 311 4069cc 306->311 315 4069cf-4069d3 307->315 314 40626e-406278 308->314 309->314 318 406070-406074 310->318 319 4060e0-4060e4 310->319 320 405fcb-405fcf 310->320 321 40610b-40612c 310->321 311->315 322 406347-40634b 312->322 323 4064dc-4064e9 312->323 313->296 324 406310-40631a 313->324 316 40627e 314->316 317 4061ef-4061f5 314->317 341 4061d4-4061ec 316->341 342 40693b-406945 316->342 329 4062a8-4062ae 317->329 330 4061fb-406201 317->330 333 406920-40692a 318->333 334 40607a-406093 318->334 327 4060ea-4060fe 319->327 328 40692f-406939 319->328 320->307 326 405fd5-405fe2 320->326 321->283 335 406351-406369 322->335 336 406953-40695d 322->336 323->306 331 406320-406342 324->331 332 40695f-406969 324->332 326->311 337 405fe8-40602e 326->337 340 406101-406109 327->340 328->307 338 4062b0-4062ce 329->338 339 40630c 329->339 330->302 330->339 331->323 332->307 333->307 343 406096-40609a 334->343 335->313 336->307 344 406030-406034 337->344 345 406056-406058 337->345 346 4062d0-4062e4 338->346 347 4062e6-4062f8 338->347 339->324 340->319 340->321 341->317 342->307 343->318 348 40609c-4060a2 343->348 351 406036-406039 GlobalFree 344->351 352 40603f-40604d GlobalAlloc 344->352 354 406066-40606e 345->354 355 40605a-406064 345->355 353 4062fb-406305 346->353 347->353 349 4060a4-4060ab 348->349 350 4060cc-4060de 348->350 356 4060b6-4060c6 GlobalAlloc 349->356 357 4060ad-4060b0 GlobalFree 349->357 350->340 351->352 352->311 358 406053 352->358 353->329 359 406307 353->359 354->343 355->354 355->355 356->311 356->350 357->356 358->345 361 406947-406951 359->361 362 40628d-4062a5 359->362 361->307 362->329
                            Memory Dump Source
                            • Source File: 00000000.00000002.1722120987.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1722107573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722136817.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722230617.000000000052B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Uninstall.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: d33a5f9df5361017a2c2cd63e74982cac3414c6cd2676332625b738f25334a08
                            • Instruction ID: 7fe690cacb8e5da35aefc448adc87e2f65dc6f56ff44dc44b78e187fa59068bd
                            • Opcode Fuzzy Hash: d33a5f9df5361017a2c2cd63e74982cac3414c6cd2676332625b738f25334a08
                            • Instruction Fuzzy Hash: 70F16871D00229CBDF28CFA8C8946ADBBB1FF44305F25816ED856BB281D7785A96CF44
                            APIs
                            • GetModuleHandleA.KERNEL32(?,?,00000000,0040327F,00000008), ref: 00405E9A
                            • LoadLibraryA.KERNELBASE(?,?,00000000,0040327F,00000008), ref: 00405EA5
                            • GetProcAddress.KERNEL32(00000000,?), ref: 00405EB6
                            Memory Dump Source
                            • Source File: 00000000.00000002.1722120987.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1722107573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722136817.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722230617.000000000052B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Uninstall.jbxd
                            Similarity
                            • API ID: AddressHandleLibraryLoadModuleProc
                            • String ID:
                            • API String ID: 310444273-0
                            • Opcode ID: cda0668070076e7cac62d6abfc32be1e4fdfe709f191786036c768239460f4b3
                            • Instruction ID: 91087f9554edebef2dfdad95906e97f440013226b38390424b9c6ad62026e406
                            • Opcode Fuzzy Hash: cda0668070076e7cac62d6abfc32be1e4fdfe709f191786036c768239460f4b3
                            • Instruction Fuzzy Hash: 0FE08C32A08511BBD3115B30ED0896B77A8EA89B41304083EF959F6290D734EC119BFA

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 106 4058b4-4058c5 call 405e88 109 4058c7-4058d2 MoveFileExA 106->109 110 4058d8-4058f4 106->110 109->110 111 405a11 109->111 112 4058f6-40590e call 40583d CloseHandle GetShortPathNameA 110->112 113 40591c-40592b GetShortPathNameA 110->113 115 405a17-405a1b 111->115 112->115 119 405914-405916 112->119 114 405931-405933 113->114 113->115 114->115 118 405939-405977 wsprintfA call 405b88 call 40583d 114->118 118->111 124 40597d-405999 GetFileSize GlobalAlloc 118->124 119->113 119->115 125 405a0a-405a0b CloseHandle 124->125 126 40599b-4059ad ReadFile 124->126 125->111 126->125 127 4059af-4059b3 126->127 127->125 128 4059b5-4059c2 call 4057b2 127->128 131 4059c4-4059d2 call 405b66 128->131 132 405a1e-405a2e call 4057b2 128->132 137 4059d5 131->137 132->137 138 405a30-405a38 132->138 139 4059d7-405a04 call 4057fe SetFilePointer WriteFile GlobalFree 137->139 140 405a45-405a4b 138->140 141 405a3a-405a43 138->141 139->125 140->139 141->140 141->141
                            APIs
                              • Part of subcall function 00405E88: GetModuleHandleA.KERNEL32(?,?,00000000,0040327F,00000008), ref: 00405E9A
                              • Part of subcall function 00405E88: LoadLibraryA.KERNELBASE(?,?,00000000,0040327F,00000008), ref: 00405EA5
                              • Part of subcall function 00405E88: GetProcAddress.KERNEL32(00000000,?), ref: 00405EB6
                            • MoveFileExA.KERNEL32(00000000,?,00000005,00000001,?,00000000,?,?,00405649,?,00000000,000000F1,?), ref: 004058CE
                            • CloseHandle.KERNEL32(00000000,?,00000000,00000001,00000001,?,00000000,?,?,00405649,?,00000000,000000F1,?), ref: 00405901
                            • GetShortPathNameA.KERNEL32(?,0043E630,00000400), ref: 0040590A
                            • GetShortPathNameA.KERNEL32(00000000,0043E0A8,00000400), ref: 00405927
                            • wsprintfA.USER32 ref: 00405945
                            • GetFileSize.KERNEL32(00000000,00000000,0043E0A8,C0000000,00000004,0043E0A8,?,?,?,00000000,000000F1,?), ref: 00405980
                            • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,00000000,000000F1,?), ref: 0040598F
                            • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,00000000,000000F1,?), ref: 004059A5
                            • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000,?,0043DCA8,00000000,-0000000A,00409350,00000000,[Rename],?,?,00000000,000000F1,?), ref: 004059EB
                            • WriteFile.KERNEL32(00000000,00000000,?,?,00000000,?,?,00000000,000000F1,?), ref: 004059FD
                            • GlobalFree.KERNEL32(00000000), ref: 00405A04
                            • CloseHandle.KERNEL32(00000000,?,?,00000000,000000F1,?), ref: 00405A0B
                              • Part of subcall function 004057B2: lstrlenA.KERNEL32(00000000,?,00000000,00000000,004059C0,00000000,[Rename],?,?,00000000,000000F1,?), ref: 004057B9
                              • Part of subcall function 004057B2: lstrlenA.KERNEL32(00000000,00000000,?,00000000,00000000,004059C0,00000000,[Rename],?,?,00000000,000000F1,?), ref: 004057E9
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1722120987.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1722107573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722136817.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722230617.000000000052B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Uninstall.jbxd
                            Similarity
                            • API ID: File$Handle$CloseGlobalNamePathShortlstrlen$AddressAllocFreeLibraryLoadModuleMovePointerProcReadSizeWritewsprintf
                            • String ID: %s=%s$0C$[Rename]
                            • API String ID: 3178728463-2466990604
                            • Opcode ID: 858f5c4d80c95a4a08ed66f26c8312584c08bcf35fb67b9fffa86d3c3ff23487
                            • Instruction ID: e4acf15c9d64fbf53db5c011c469a52faadac1e9922c4ea510687d497f36d3fc
                            • Opcode Fuzzy Hash: 858f5c4d80c95a4a08ed66f26c8312584c08bcf35fb67b9fffa86d3c3ff23487
                            • Instruction Fuzzy Hash: AF410231605B01ABE3207B619C89F6B3A5CEF85715F140136FE05F22D2E678A801CEBE

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 144 402c72-402cc0 GetTickCount GetModuleFileNameA call 40583d 147 402cc2-402cc7 144->147 148 402ccc-402cfa call 405b66 call 4056a0 call 405b66 GetFileSize 144->148 149 402f11-402f15 147->149 156 402d00-402d17 148->156 157 402dea-402df8 call 402bd3 148->157 158 402d19 156->158 159 402d1b-402d21 call 4031bf 156->159 163 402ec9-402ece 157->163 164 402dfe-402e01 157->164 158->159 165 402d26-402d28 159->165 163->149 166 402e03-402e14 call 4031f1 call 4031bf 164->166 167 402e2d-402e79 GlobalAlloc call 405f62 call 40586c CreateFileA 164->167 168 402e85-402e8d call 402bd3 165->168 169 402d2e-402d34 165->169 187 402e19-402e1b 166->187 194 402e7b-402e80 167->194 195 402e8f-402ebf call 4031f1 call 402f18 167->195 168->163 172 402db4-402db8 169->172 173 402d36-402d4e call 4057fe 169->173 176 402dc1-402dc7 172->176 177 402dba-402dc0 call 402bd3 172->177 173->176 191 402d50-402d57 173->191 183 402dc9-402dd7 call 405ef4 176->183 184 402dda-402de4 176->184 177->176 183->184 184->156 184->157 187->163 192 402e21-402e27 187->192 191->176 196 402d59-402d60 191->196 192->163 192->167 194->149 204 402ec4-402ec7 195->204 196->176 198 402d62-402d69 196->198 198->176 200 402d6b-402d72 198->200 200->176 202 402d74-402d94 200->202 202->163 203 402d9a-402d9e 202->203 205 402da0-402da4 203->205 206 402da6-402dae 203->206 204->163 207 402ed0-402ee1 204->207 205->157 205->206 206->176 208 402db0-402db2 206->208 209 402ee3 207->209 210 402ee9-402eee 207->210 208->176 209->210 211 402eef-402ef5 210->211 211->211 212 402ef7-402f0f call 4057fe 211->212 212->149
                            APIs
                            • GetTickCount.KERNEL32 ref: 00402C86
                            • GetModuleFileNameA.KERNEL32(00000000,0047D000,00002000), ref: 00402CA2
                              • Part of subcall function 0040583D: GetFileAttributesA.KERNELBASE(00000003,00402CB5,0047D000,80000000,00000003), ref: 00405841
                              • Part of subcall function 0040583D: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405863
                            • GetFileSize.KERNEL32(00000000,00000000,0047F000,00000000,00475000,00475000,0047D000,0047D000,80000000,00000003), ref: 00402CEB
                            • GlobalAlloc.KERNELBASE(00000040,00409130), ref: 00402E32
                            Strings
                            • Error launching installer, xrefs: 00402CC2
                            • soft, xrefs: 00402D62
                            • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 00402EC9
                            • Error writing temporary file. Make sure your temp folder is valid., xrefs: 00402E7B
                            • Inst, xrefs: 00402D59
                            • Null, xrefs: 00402D6B
                            Memory Dump Source
                            • Source File: 00000000.00000002.1722120987.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1722107573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722136817.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722230617.000000000052B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Uninstall.jbxd
                            Similarity
                            • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                            • String ID: Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                            • API String ID: 2803837635-3016655952
                            • Opcode ID: 320803e11de9210893dcdc2625a9e59dd4b90fb97de3a53ae8615a4bb38eddc3
                            • Instruction ID: 03df0606648b4ab024968444c385b092b5c0145c7837f8ae0f7e4b1fa0432a39
                            • Opcode Fuzzy Hash: 320803e11de9210893dcdc2625a9e59dd4b90fb97de3a53ae8615a4bb38eddc3
                            • Instruction Fuzzy Hash: EB61C171940215ABDB20DF65DE89B9A77B8EB05314F20403BF904B72D2D7BC9E418BAD

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 215 403043-40306c GetTickCount 216 403072-40309d call 4031f1 SetFilePointer 215->216 217 4031ad-4031b5 call 402bd3 215->217 223 4030a2-4030b4 216->223 222 4031b7-4031bc 217->222 224 4030b6 223->224 225 4030b8-4030c6 call 4031bf 223->225 224->225 228 4030cc-4030d8 225->228 229 40319f-4031a2 225->229 230 4030de-4030e4 228->230 229->222 231 4030e6-4030ec 230->231 232 40310f-40312b call 405f82 230->232 231->232 234 4030ee-40310e call 402bd3 231->234 238 4031a8 232->238 239 40312d-403135 232->239 234->232 240 4031aa-4031ab 238->240 241 403137-40314d WriteFile 239->241 242 403169-40316f 239->242 240->222 243 4031a4-4031a6 241->243 244 40314f-403153 241->244 242->238 245 403171-403173 242->245 243->240 244->243 246 403155-403161 244->246 245->238 247 403175-403188 245->247 246->230 248 403167 246->248 247->223 249 40318e-40319d SetFilePointer 247->249 248->247 249->217
                            APIs
                            • GetTickCount.KERNEL32 ref: 00403058
                              • Part of subcall function 004031F1: SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402E9D,?), ref: 004031FF
                            • SetFilePointer.KERNELBASE(00000000,00000000,?,00000000,?,00402F4E,00000004,00000000,00000000,00000000,?,?,?,00402EC4,000000FF,00000000), ref: 0040308B
                            • WriteFile.KERNELBASE(00413C40,?,00000000,00000000,0041BC40,00004000,?,00000000,?,00402F4E,00000004,00000000,00000000,00000000,?,?), ref: 00403145
                            • SetFilePointer.KERNELBASE(0000E0DC,00000000,00000000,0041BC40,00004000,?,00000000,?,00402F4E,00000004,00000000,00000000,00000000,?,?), ref: 00403197
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1722120987.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1722107573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722136817.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722230617.000000000052B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Uninstall.jbxd
                            Similarity
                            • API ID: File$Pointer$CountTickWrite
                            • String ID: @<A
                            • API String ID: 2146148272-4260584491
                            • Opcode ID: 174d68c61dc59966423a732e2d3c391a81e8efc1f43ef34debc31d603f9fbc71
                            • Instruction ID: 38a819a872193e9674b1f8cae37046a3c02fbcd4fdc241d2fccf286a9b7d6e75
                            • Opcode Fuzzy Hash: 174d68c61dc59966423a732e2d3c391a81e8efc1f43ef34debc31d603f9fbc71
                            • Instruction Fuzzy Hash: A841A0726081019FD710DF29ED409A67FACF748357714427BE800BA2E5EB386E499B9D

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 250 402f18-402f27 251 402f45-402f50 call 403043 250->251 252 402f29-402f3f SetFilePointer 250->252 255 402f56-402f70 ReadFile 251->255 256 40303c-403040 251->256 252->251 257 402f76-402f79 255->257 258 403039 255->258 257->258 260 402f7f-402f92 call 403043 257->260 259 40303b 258->259 259->256 260->256 263 402f98-402f9b 260->263 264 403008-40300e 263->264 265 402f9d-402fa0 263->265 268 403010 264->268 269 403013-403026 ReadFile 264->269 266 403034-403037 265->266 267 402fa6 265->267 266->256 270 402fab-402fb3 267->270 268->269 269->258 271 403028-403031 269->271 272 402fb5 270->272 273 402fb8-402fca ReadFile 270->273 271->266 272->273 273->258 274 402fcc-402fcf 273->274 274->258 275 402fd1-402fe6 WriteFile 274->275 276 403004-403006 275->276 277 402fe8-402feb 275->277 276->259 277->276 278 402fed-403000 277->278 278->270 279 403002 278->279 279->266
                            APIs
                            • SetFilePointer.KERNEL32(00409130,00000000,00000000,00000000,00000000,00000000,?,?,?,00402EC4,000000FF,00000000,00000000,00409130,?), ref: 00402F3F
                            • ReadFile.KERNELBASE(00409130,00000004,?,00000000,00000004,00000000,00000000,00000000,?,?,?,00402EC4,000000FF,00000000,00000000,00409130), ref: 00402F6C
                            • ReadFile.KERNEL32(0041BC40,00004000,?,00000000,00409130,?,00402EC4,000000FF,00000000,00000000,00409130,?), ref: 00402FC6
                            • WriteFile.KERNEL32(00000000,0041BC40,?,000000FF,00000000,?,00402EC4,000000FF,00000000,00000000,00409130,?), ref: 00402FDE
                            Memory Dump Source
                            • Source File: 00000000.00000002.1722120987.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1722107573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722136817.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722230617.000000000052B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Uninstall.jbxd
                            Similarity
                            • API ID: File$Read$PointerWrite
                            • String ID:
                            • API String ID: 2113905535-0
                            • Opcode ID: 3f7d08bd1b607004b86426ebc4fc7916ae32c0a4dad671b24d0311feea879852
                            • Instruction ID: ec21393f4165ad4c0dee3133c7f646fae2b171c51213e780747c13a8c2f6635b
                            • Opcode Fuzzy Hash: 3f7d08bd1b607004b86426ebc4fc7916ae32c0a4dad671b24d0311feea879852
                            • Instruction Fuzzy Hash: 8A314731501249EBDB21CF55DD44A9E7FBCEB803A5F20403AF904A6194D7749F81EBA9

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 363 40586c-405876 364 405877-4058a1 GetTickCount GetTempFileNameA 363->364 365 4058b0-4058b2 364->365 366 4058a3-4058a5 364->366 368 4058aa-4058ad 365->368 366->364 367 4058a7 366->367 367->368
                            APIs
                            • GetTickCount.KERNEL32 ref: 0040587F
                            • GetTempFileNameA.KERNELBASE(?,0061736E,00000000,?), ref: 00405899
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1722120987.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1722107573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722136817.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722230617.000000000052B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Uninstall.jbxd
                            Similarity
                            • API ID: CountFileNameTempTick
                            • String ID: nsa
                            • API String ID: 1716503409-2209301699
                            • Opcode ID: fc5e126f8815d4696b9f295c06fae67d9d4e63728d0dbdda5093f58b42bfadad
                            • Instruction ID: 7bdb262dbebad2fb51735791196b4a750b565e3ebaa120aaaad2cbe3184e43fd
                            • Opcode Fuzzy Hash: fc5e126f8815d4696b9f295c06fae67d9d4e63728d0dbdda5093f58b42bfadad
                            • Instruction Fuzzy Hash: B1F0A73734820876E7105E55DC04B9B7F9DDF91760F14C027FE44DA1C0D6B49954C7A5

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 369 4053c6-4053f3 CreateProcessA 370 405401-405402 369->370 371 4053f5-4053fe CloseHandle 369->371 371->370
                            APIs
                            • CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,0043E4A8,Error launching installer), ref: 004053EB
                            • CloseHandle.KERNEL32(?), ref: 004053F8
                            Strings
                            • Error launching installer, xrefs: 004053D9
                            Memory Dump Source
                            • Source File: 00000000.00000002.1722120987.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1722107573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722136817.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722230617.000000000052B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Uninstall.jbxd
                            Similarity
                            • API ID: CloseCreateHandleProcess
                            • String ID: Error launching installer
                            • API String ID: 3712363035-66219284
                            • Opcode ID: b7c9d10a8054e1d63aace513746620387ba85298539cfb76979fbda5e6a590d7
                            • Instruction ID: 5c094ea24e64812d6ab6634a7517117686aedeac2daf9b822694a8d73c7fdf3e
                            • Opcode Fuzzy Hash: b7c9d10a8054e1d63aace513746620387ba85298539cfb76979fbda5e6a590d7
                            • Instruction Fuzzy Hash: 43E0ECB4900209AFEB00AF65DC49AAB7BBDEB18315F10D522A911E2190D775D8109A79

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 372 406566-40656c 373 406571-40686f 372->373 374 40656e-406570 372->374 376 406899-40689d 373->376 374->373 377 4068fd-406910 376->377 378 40689f-4068c0 376->378 381 406819-40681f 377->381 379 4068c2-4068d7 378->379 380 4068d9-4068ec 378->380 383 4068ef-4068f6 379->383 380->383 384 405fc4 381->384 385 4069cc 381->385 386 406896 383->386 387 4068f8 383->387 389 406070-406074 384->389 390 4060e0-4060e4 384->390 391 405fcb-405fcf 384->391 392 40610b-4067b2 384->392 388 4069cf-4069d3 385->388 386->376 396 40687b-406893 387->396 397 4069ad 387->397 401 406920-40692a 389->401 402 40607a-406093 389->402 398 4060ea-4060fe 390->398 399 40692f-406939 390->399 394 405fd5-405fe2 391->394 395 4069b7-4069ca 391->395 405 4067b4-4067ca 392->405 406 4067cc-4067e2 392->406 394->385 403 405fe8-40602e 394->403 395->388 396->386 397->395 404 406101-406109 398->404 399->395 401->395 407 406096-40609a 402->407 409 406030-406034 403->409 410 406056-406058 403->410 404->390 404->392 408 4067e5-4067ec 405->408 406->408 407->389 411 40609c-4060a2 407->411 418 406813 408->418 419 4067ee-4067f2 408->419 414 406036-406039 GlobalFree 409->414 415 40603f-40604d GlobalAlloc 409->415 416 406066-40606e 410->416 417 40605a-406064 410->417 412 4060a4-4060ab 411->412 413 4060cc-4060de 411->413 420 4060b6-4060c6 GlobalAlloc 412->420 421 4060ad-4060b0 GlobalFree 412->421 413->404 414->415 415->385 422 406053 415->422 416->407 417->416 417->417 418->381 423 4069a1-4069ab 419->423 424 4067f8-406810 419->424 420->385 420->413 421->420 422->410 423->395 424->418
                            Memory Dump Source
                            • Source File: 00000000.00000002.1722120987.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1722107573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722136817.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722230617.000000000052B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Uninstall.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b47bfdafb4299acf6df14b1a265fb959f908a42d38d0bc6d60d6342fbb02c28f
                            • Instruction ID: 319d18918fa2cc3741333e20ed782d5c303dd2f769888eebbc994f2124d7c2e6
                            • Opcode Fuzzy Hash: b47bfdafb4299acf6df14b1a265fb959f908a42d38d0bc6d60d6342fbb02c28f
                            • Instruction Fuzzy Hash: 29A15171E00229CBDF28CFA8C8547ADBBB1FF44305F15812AD856BB281D7789A96DF44

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 425 406767-40676b 426 40678d-40679a 425->426 427 40676d-40686f 425->427 429 40679d-4067b2 426->429 435 406899-40689d 427->435 431 4067b4-4067ca 429->431 432 4067cc-4067e2 429->432 433 4067e5-4067ec 431->433 432->433 436 406813 433->436 437 4067ee-4067f2 433->437 439 4068fd-406910 435->439 440 40689f-4068c0 435->440 438 406819-40681f 436->438 441 4069a1-4069ab 437->441 442 4067f8-406810 437->442 447 405fc4 438->447 448 4069cc 438->448 439->438 445 4068c2-4068d7 440->445 446 4068d9-4068ec 440->446 444 4069b7-4069ca 441->444 442->436 450 4069cf-4069d3 444->450 449 4068ef-4068f6 445->449 446->449 451 406070-406074 447->451 452 4060e0-4060e4 447->452 453 405fcb-405fcf 447->453 454 40610b-40612c 447->454 448->450 455 406896 449->455 456 4068f8 449->456 461 406920-40692a 451->461 462 40607a-406093 451->462 458 4060ea-4060fe 452->458 459 40692f-406939 452->459 453->444 457 405fd5-405fe2 453->457 454->429 455->435 464 40687b-406893 456->464 465 4069ad 456->465 457->448 463 405fe8-40602e 457->463 466 406101-406109 458->466 459->444 461->444 467 406096-40609a 462->467 468 406030-406034 463->468 469 406056-406058 463->469 464->455 465->444 466->452 466->454 467->451 470 40609c-4060a2 467->470 473 406036-406039 GlobalFree 468->473 474 40603f-40604d GlobalAlloc 468->474 475 406066-40606e 469->475 476 40605a-406064 469->476 471 4060a4-4060ab 470->471 472 4060cc-4060de 470->472 477 4060b6-4060c6 GlobalAlloc 471->477 478 4060ad-4060b0 GlobalFree 471->478 472->466 473->474 474->448 479 406053 474->479 475->467 476->475 476->476 477->448 477->472 478->477 479->469
                            Memory Dump Source
                            • Source File: 00000000.00000002.1722120987.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1722107573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722136817.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722230617.000000000052B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Uninstall.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: d0b545a720d06a2780d8eb9310de1c164ea8e259f40aa19cdef3f662a7789f4d
                            • Instruction ID: 868f2ec1f3ea74d7de1394d818727f69d5aca31e92bf34b5737afca42cfaef71
                            • Opcode Fuzzy Hash: d0b545a720d06a2780d8eb9310de1c164ea8e259f40aa19cdef3f662a7789f4d
                            • Instruction Fuzzy Hash: 6E913171D00229CBEF28CF98C8547ADBBB1FF44305F15812AD856BB281C7789A9ADF44

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 480 40647d-406481 481 406487-40648b 480->481 482 406538-406547 480->482 483 406491-4064a5 481->483 484 4069cc 481->484 485 40679d-4067b2 482->485 487 40696b-406975 483->487 488 4064ab-4064b4 483->488 486 4069cf-4069d3 484->486 489 4067b4-4067ca 485->489 490 4067cc-4067e2 485->490 494 4069b7-4069ca 487->494 492 4064b6 488->492 493 4064b9-4064e9 488->493 491 4067e5-4067ec 489->491 490->491 496 406813-40681f 491->496 497 4067ee-4067f2 491->497 492->493 499 405fb5-405fbe 493->499 494->486 496->499 500 4069a1-4069ab 497->500 501 4067f8-406810 497->501 499->484 502 405fc4 499->502 500->494 501->496 503 406070-406074 502->503 504 4060e0-4060e4 502->504 505 405fcb-405fcf 502->505 506 40610b-40612c 502->506 510 406920-40692a 503->510 511 40607a-406093 503->511 508 4060ea-4060fe 504->508 509 40692f-406939 504->509 505->494 507 405fd5-405fe2 505->507 506->485 507->484 512 405fe8-40602e 507->512 513 406101-406109 508->513 509->494 510->494 514 406096-40609a 511->514 515 406030-406034 512->515 516 406056-406058 512->516 513->504 513->506 514->503 517 40609c-4060a2 514->517 520 406036-406039 GlobalFree 515->520 521 40603f-40604d GlobalAlloc 515->521 522 406066-40606e 516->522 523 40605a-406064 516->523 518 4060a4-4060ab 517->518 519 4060cc-4060de 517->519 524 4060b6-4060c6 GlobalAlloc 518->524 525 4060ad-4060b0 GlobalFree 518->525 519->513 520->521 521->484 526 406053 521->526 522->514 523->522 523->523 524->484 524->519 525->524 526->516
                            Memory Dump Source
                            • Source File: 00000000.00000002.1722120987.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1722107573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722136817.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722230617.000000000052B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Uninstall.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3ca4e82cbd918d9bc6f131d9bc7fd5d61b9600368ad5a57dd77e762cc9babb20
                            • Instruction ID: e06b97397237a54a8f7c6fae7a0c48c933f493286525731b7b3672fa0d973436
                            • Opcode Fuzzy Hash: 3ca4e82cbd918d9bc6f131d9bc7fd5d61b9600368ad5a57dd77e762cc9babb20
                            • Instruction Fuzzy Hash: 678155B1D00229CFDF24CFA8C8447ADBBB1FB44305F25816AD456BB281D7789A96CF54

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 527 405f82-405fa5 528 405fa7-405faa 527->528 529 405faf-405fb2 527->529 530 4069cf-4069d3 528->530 531 405fb5-405fbe 529->531 532 405fc4 531->532 533 4069cc 531->533 534 406070-406074 532->534 535 4060e0-4060e4 532->535 536 405fcb-405fcf 532->536 537 40610b-4067b2 532->537 533->530 543 406920-40692a 534->543 544 40607a-406093 534->544 540 4060ea-4060fe 535->540 541 40692f-406939 535->541 538 405fd5-405fe2 536->538 539 4069b7-4069ca 536->539 547 4067b4-4067ca 537->547 548 4067cc-4067e2 537->548 538->533 545 405fe8-40602e 538->545 539->530 546 406101-406109 540->546 541->539 543->539 549 406096-40609a 544->549 551 406030-406034 545->551 552 406056-406058 545->552 546->535 546->537 550 4067e5-4067ec 547->550 548->550 549->534 553 40609c-4060a2 549->553 560 406813-40681f 550->560 561 4067ee-4067f2 550->561 556 406036-406039 GlobalFree 551->556 557 40603f-40604d GlobalAlloc 551->557 558 406066-40606e 552->558 559 40605a-406064 552->559 554 4060a4-4060ab 553->554 555 4060cc-4060de 553->555 562 4060b6-4060c6 GlobalAlloc 554->562 563 4060ad-4060b0 GlobalFree 554->563 555->546 556->557 557->533 565 406053 557->565 558->549 559->558 559->559 560->531 566 4069a1-4069ab 561->566 567 4067f8-406810 561->567 562->533 562->555 563->562 565->552 566->539 567->560
                            Memory Dump Source
                            • Source File: 00000000.00000002.1722120987.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1722107573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722136817.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722230617.000000000052B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Uninstall.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: c94337aa44be19872a05e7fe324c1f72408cb83bc4afcb37e89916e28dd5cdb7
                            • Instruction ID: 3ccfc7c80e99de65fa6db0e0edc8679980b1d0ea62cd2807200041591328ae3c
                            • Opcode Fuzzy Hash: c94337aa44be19872a05e7fe324c1f72408cb83bc4afcb37e89916e28dd5cdb7
                            • Instruction Fuzzy Hash: D98187B1D00229CBDF24CFA8C8447AEBBB1FB44305F11816AD856BB2C1C7785A96CF44

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 568 4063d0-4063d4 569 4063f2-406435 568->569 570 4063d6-4063ed 568->570 571 40679d-4067b2 569->571 570->571 572 4067b4-4067ca 571->572 573 4067cc-4067e2 571->573 574 4067e5-4067ec 572->574 573->574 575 406813-40681f 574->575 576 4067ee-4067f2 574->576 582 405fc4 575->582 583 4069cc 575->583 578 4069a1-4069ab 576->578 579 4067f8-406810 576->579 581 4069b7-4069ca 578->581 579->575 584 4069cf-4069d3 581->584 585 406070-406074 582->585 586 4060e0-4060e4 582->586 587 405fcb-405fcf 582->587 588 40610b-40612c 582->588 583->584 592 406920-40692a 585->592 593 40607a-406093 585->593 590 4060ea-4060fe 586->590 591 40692f-406939 586->591 587->581 589 405fd5-405fe2 587->589 588->571 589->583 594 405fe8-40602e 589->594 595 406101-406109 590->595 591->581 592->581 596 406096-40609a 593->596 597 406030-406034 594->597 598 406056-406058 594->598 595->586 595->588 596->585 599 40609c-4060a2 596->599 602 406036-406039 GlobalFree 597->602 603 40603f-40604d GlobalAlloc 597->603 604 406066-40606e 598->604 605 40605a-406064 598->605 600 4060a4-4060ab 599->600 601 4060cc-4060de 599->601 606 4060b6-4060c6 GlobalAlloc 600->606 607 4060ad-4060b0 GlobalFree 600->607 601->595 602->603 603->583 608 406053 603->608 604->596 605->604 605->605 606->583 606->601 607->606 608->598
                            Memory Dump Source
                            • Source File: 00000000.00000002.1722120987.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1722107573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722136817.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722230617.000000000052B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Uninstall.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 040a7e0d789931a885e98904e34fb369bef72c7c312577bd0d6f252efd828c84
                            • Instruction ID: 235c9a1f152390887c8e3346b3cf8cf745e7d176c25095dba4735a56a8f4339d
                            • Opcode Fuzzy Hash: 040a7e0d789931a885e98904e34fb369bef72c7c312577bd0d6f252efd828c84
                            • Instruction Fuzzy Hash: 80714371D00229CBDF28CFA8C8447ADBBF1FB48305F15806AD846BB281D7395A96DF54

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 609 4064ee-4064f2 610 4064f4-4064f7 609->610 611 4064f9-406510 609->611 612 40652f-406547 610->612 611->612 613 40679d-4067b2 611->613 612->613 615 4067b4-4067ca 613->615 616 4067cc-4067e2 613->616 617 4067e5-4067ec 615->617 616->617 618 406813-40681f 617->618 619 4067ee-4067f2 617->619 625 405fc4 618->625 626 4069cc 618->626 621 4069a1-4069ab 619->621 622 4067f8-406810 619->622 624 4069b7-4069ca 621->624 622->618 627 4069cf-4069d3 624->627 628 406070-406074 625->628 629 4060e0-4060e4 625->629 630 405fcb-405fcf 625->630 631 40610b-40612c 625->631 626->627 635 406920-40692a 628->635 636 40607a-406093 628->636 633 4060ea-4060fe 629->633 634 40692f-406939 629->634 630->624 632 405fd5-405fe2 630->632 631->613 632->626 637 405fe8-40602e 632->637 638 406101-406109 633->638 634->624 635->624 639 406096-40609a 636->639 640 406030-406034 637->640 641 406056-406058 637->641 638->629 638->631 639->628 642 40609c-4060a2 639->642 645 406036-406039 GlobalFree 640->645 646 40603f-40604d GlobalAlloc 640->646 647 406066-40606e 641->647 648 40605a-406064 641->648 643 4060a4-4060ab 642->643 644 4060cc-4060de 642->644 649 4060b6-4060c6 GlobalAlloc 643->649 650 4060ad-4060b0 GlobalFree 643->650 644->638 645->646 646->626 651 406053 646->651 647->639 648->647 648->648 649->626 649->644 650->649 651->641
                            Memory Dump Source
                            • Source File: 00000000.00000002.1722120987.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1722107573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722136817.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722230617.000000000052B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Uninstall.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 55b1e8378e3b2d282ecc9e99db2cbf184c75cfe722202a43e2005f386b139382
                            • Instruction ID: 067b91939e33353516387f96afd3df60e22fb0a2a23546be1218d687de4ca84d
                            • Opcode Fuzzy Hash: 55b1e8378e3b2d282ecc9e99db2cbf184c75cfe722202a43e2005f386b139382
                            • Instruction Fuzzy Hash: 14715371E00229CFEF28CF98C844BADBBB1FB44305F15816AD816BB281C7799996DF54

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 652 40643a-40643e 653 406440-40645c 652->653 654 406461-406478 652->654 655 40679d-4067b2 653->655 654->655 656 4067b4-4067ca 655->656 657 4067cc-4067e2 655->657 658 4067e5-4067ec 656->658 657->658 659 406813-40681f 658->659 660 4067ee-4067f2 658->660 666 405fc4 659->666 667 4069cc 659->667 662 4069a1-4069ab 660->662 663 4067f8-406810 660->663 665 4069b7-4069ca 662->665 663->659 668 4069cf-4069d3 665->668 669 406070-406074 666->669 670 4060e0-4060e4 666->670 671 405fcb-405fcf 666->671 672 40610b-40612c 666->672 667->668 676 406920-40692a 669->676 677 40607a-406093 669->677 674 4060ea-4060fe 670->674 675 40692f-406939 670->675 671->665 673 405fd5-405fe2 671->673 672->655 673->667 678 405fe8-40602e 673->678 679 406101-406109 674->679 675->665 676->665 680 406096-40609a 677->680 681 406030-406034 678->681 682 406056-406058 678->682 679->670 679->672 680->669 683 40609c-4060a2 680->683 686 406036-406039 GlobalFree 681->686 687 40603f-40604d GlobalAlloc 681->687 688 406066-40606e 682->688 689 40605a-406064 682->689 684 4060a4-4060ab 683->684 685 4060cc-4060de 683->685 690 4060b6-4060c6 GlobalAlloc 684->690 691 4060ad-4060b0 GlobalFree 684->691 685->679 686->687 687->667 692 406053 687->692 688->680 689->688 689->689 690->667 690->685 691->690 692->682
                            Memory Dump Source
                            • Source File: 00000000.00000002.1722120987.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1722107573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722136817.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722230617.000000000052B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Uninstall.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: c10b0ec6d8a1716373c4594016b158d4b4e2bf5790cbb1f15a9d43b973b4a336
                            • Instruction ID: fa01dbb36adddbb747bc37ce8d7c8691094d52a97b4972d7f98645f49a39bfe1
                            • Opcode Fuzzy Hash: c10b0ec6d8a1716373c4594016b158d4b4e2bf5790cbb1f15a9d43b973b4a336
                            • Instruction Fuzzy Hash: B3715671D00229CBEF28CF98C844BADBBB1FF44305F11816AD856BB281C7795A56DF54
                            APIs
                            • GetFileAttributesA.KERNELBASE(00000003,00402CB5,0047D000,80000000,00000003), ref: 00405841
                            • CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405863
                            Memory Dump Source
                            • Source File: 00000000.00000002.1722120987.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1722107573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722136817.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722230617.000000000052B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Uninstall.jbxd
                            Similarity
                            • API ID: File$AttributesCreate
                            • String ID:
                            • API String ID: 415043291-0
                            • Opcode ID: 6d56aff3fab625e069b8f0f4beb3d6c68df7a2746e2dd21b0a72e0224e52029a
                            • Instruction ID: 90a47e22fdd321f70bf06df01bfdefa11f3e73682391c7296034eb3a8fe04f39
                            • Opcode Fuzzy Hash: 6d56aff3fab625e069b8f0f4beb3d6c68df7a2746e2dd21b0a72e0224e52029a
                            • Instruction Fuzzy Hash: 8CD09E31658301AFEF098F20DD1AF2E7AA2EB84B00F10562CB646940E0D6715815DB16
                            APIs
                            • CloseHandle.KERNEL32(FFFFFFFF,00000000,0040342D,00000000), ref: 004035CF
                            • CloseHandle.KERNEL32(FFFFFFFF,00000000,0040342D,00000000), ref: 004035E3
                            Memory Dump Source
                            • Source File: 00000000.00000002.1722120987.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1722107573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722136817.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722230617.000000000052B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Uninstall.jbxd
                            Similarity
                            • API ID: CloseHandle
                            • String ID:
                            • API String ID: 2962429428-0
                            • Opcode ID: cf1c0dce9632df3043923ee584cd2e69872593ec5d746abbedfa489e726c2207
                            • Instruction ID: 6d42d11965f2adb29e1169b23679bd7ec52781afc4985877fb6b731432307fd0
                            • Opcode Fuzzy Hash: cf1c0dce9632df3043923ee584cd2e69872593ec5d746abbedfa489e726c2207
                            • Instruction Fuzzy Hash: A9E0CD3050061066C234AF7CAD455463B1C9B413377248722F138F21F2C7389E824AED
                            APIs
                            • ReadFile.KERNELBASE(00409130,00000000,00000000,00000000,0041BC40,00413C40,004030C4,0041BC40,00004000,?,00000000,?,00402F4E,00000004,00000000,00000000), ref: 004031D6
                            Memory Dump Source
                            • Source File: 00000000.00000002.1722120987.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1722107573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722136817.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722230617.000000000052B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Uninstall.jbxd
                            Similarity
                            • API ID: FileRead
                            • String ID:
                            • API String ID: 2738559852-0
                            • Opcode ID: 728267699a9b44ddad9e6e694247195ab13049bac6004c2e56fc09e99b3f0f19
                            • Instruction ID: 4c5c04567c480c11bae84e94003d2882b37cb3083c3cc1db03504fe221b835f3
                            • Opcode Fuzzy Hash: 728267699a9b44ddad9e6e694247195ab13049bac6004c2e56fc09e99b3f0f19
                            • Instruction Fuzzy Hash: DAE08631500119BBCF215E619C00A973B5CEB09362F008033FA04E9190D532DB109BA5
                            APIs
                              • Part of subcall function 00405DC8: CharNextA.USER32(?,*?|<>/":,00000000,00479000,0046F000,00479000,00000000,00403214,00479000,00000000,00403386), ref: 00405E20
                              • Part of subcall function 00405DC8: CharNextA.USER32(?,?,?,00000000), ref: 00405E2D
                              • Part of subcall function 00405DC8: CharNextA.USER32(?,00479000,0046F000,00479000,00000000,00403214,00479000,00000000,00403386), ref: 00405E32
                              • Part of subcall function 00405DC8: CharPrevA.USER32(?,?,0046F000,00479000,00000000,00403214,00479000,00000000,00403386), ref: 00405E42
                            • CreateDirectoryA.KERNELBASE(00479000,00000000,00479000,00479000,00479000,00000000,00403386), ref: 00403229
                            Memory Dump Source
                            • Source File: 00000000.00000002.1722120987.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1722107573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722136817.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722230617.000000000052B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Uninstall.jbxd
                            Similarity
                            • API ID: Char$Next$CreateDirectoryPrev
                            • String ID:
                            • API String ID: 4115351271-0
                            • Opcode ID: 11ac191fccc5bbc9840a496eb92e8966bc42d1118a3597eec2c2256fb95cb988
                            • Instruction ID: be85e933f5554b091e9989970333af42224d3bace8f0b1f193a31a6a85193b6d
                            • Opcode Fuzzy Hash: 11ac191fccc5bbc9840a496eb92e8966bc42d1118a3597eec2c2256fb95cb988
                            • Instruction Fuzzy Hash: A0D0C92255AE3031C652323A3C06FDF092C9F1272AF55887BF908B40D54B6C1E4289EE
                            APIs
                            • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402E9D,?), ref: 004031FF
                            Memory Dump Source
                            • Source File: 00000000.00000002.1722120987.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1722107573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722136817.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722230617.000000000052B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Uninstall.jbxd
                            Similarity
                            • API ID: FilePointer
                            • String ID:
                            • API String ID: 973152223-0
                            • Opcode ID: 2028dafccfaa88a297be93e7ba1f52e009ec02dcd94d5fd44c1761bf2bffe23e
                            • Instruction ID: eafd0aff1283cdec3023edec91852d87283cefa69c9b21bce59c6677f93a42a7
                            • Opcode Fuzzy Hash: 2028dafccfaa88a297be93e7ba1f52e009ec02dcd94d5fd44c1761bf2bffe23e
                            • Instruction Fuzzy Hash: 14B01271644200BFDB214F00DF06F057B21A790701F108030B344380F082712420EB1E
                            APIs
                            • GetDlgItem.USER32(?,00000403), ref: 004050A1
                            • GetDlgItem.USER32(?,000003EE), ref: 004050B0
                            • GetClientRect.USER32(?,?), ref: 004050ED
                            • GetSystemMetrics.USER32(00000015), ref: 004050F5
                            • SendMessageA.USER32(?,0000101B,00000000,00000002), ref: 00405116
                            • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 00405127
                            • SendMessageA.USER32(?,00001001,00000000,00000110), ref: 0040513A
                            • SendMessageA.USER32(?,00001026,00000000,00000110), ref: 00405148
                            • SendMessageA.USER32(?,00001024,00000000,?), ref: 0040515B
                            • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 0040517D
                            • ShowWindow.USER32(?,00000008), ref: 00405191
                            • GetDlgItem.USER32(?,000003EC), ref: 004051B2
                            • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 004051C2
                            • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 004051DB
                            • SendMessageA.USER32(00000000,00002001,00000000,00000110), ref: 004051E7
                            • GetDlgItem.USER32(?,000003F8), ref: 004050BF
                              • Part of subcall function 00403F4D: SendMessageA.USER32(00000028,?,00000001,00403D7E), ref: 00403F5B
                            • GetDlgItem.USER32(?,000003EC), ref: 00405204
                            • CreateThread.KERNEL32(00000000,00000000,Function_00004FD6,00000000), ref: 00405212
                            • CloseHandle.KERNEL32(00000000), ref: 00405219
                            • ShowWindow.USER32(00000000), ref: 0040523D
                            • ShowWindow.USER32(?,00000008), ref: 00405242
                            • ShowWindow.USER32(00000008), ref: 00405289
                            • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004052BB
                            • CreatePopupMenu.USER32 ref: 004052CC
                            • AppendMenuA.USER32(00000000,00000000,00000001,00000000), ref: 004052E1
                            • GetWindowRect.USER32(?,?), ref: 004052F4
                            • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405318
                            • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405353
                            • OpenClipboard.USER32(00000000), ref: 00405363
                            • EmptyClipboard.USER32 ref: 00405369
                            • GlobalAlloc.KERNEL32(00000042,?,?,?,00000000,?,00000000), ref: 00405372
                            • GlobalLock.KERNEL32(00000000), ref: 0040537C
                            • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405390
                            • GlobalUnlock.KERNEL32(00000000), ref: 004053A8
                            • SetClipboardData.USER32(00000001,00000000), ref: 004053B3
                            • CloseClipboard.USER32 ref: 004053B9
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1722120987.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1722107573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722136817.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722230617.000000000052B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Uninstall.jbxd
                            Similarity
                            • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                            • String ID: {
                            • API String ID: 590372296-366298937
                            • Opcode ID: a51cd251cad040235ef2024c29e6b1610bda6eb2e8050d4f52d082b939cf5941
                            • Instruction ID: d5cc792025810b1fa5c52fd71f17093da58624e5fcdd428af89ce0e6d8bd8183
                            • Opcode Fuzzy Hash: a51cd251cad040235ef2024c29e6b1610bda6eb2e8050d4f52d082b939cf5941
                            • Instruction Fuzzy Hash: 21A15870804208FFDB119FA0DD89AAE3F79FB04354F10417AFA05BA2A0C7B55A41DF59
                            APIs
                            • GetDlgItem.USER32(?,000003F9), ref: 0040486A
                            • GetDlgItem.USER32(?,00000408), ref: 00404877
                            • GlobalAlloc.KERNEL32(00000040,?), ref: 004048C3
                            • LoadBitmapA.USER32(0000006E), ref: 004048D6
                            • SetWindowLongA.USER32(?,000000FC,00404E54), ref: 004048F0
                            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404904
                            • ImageList_AddMasked.COMCTL32(00000000,?,00FF00FF), ref: 00404918
                            • SendMessageA.USER32(?,00001109,00000002), ref: 0040492D
                            • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404939
                            • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 0040494B
                            • DeleteObject.GDI32(?), ref: 00404950
                            • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 0040497B
                            • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404987
                            • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404A1C
                            • SendMessageA.USER32(?,0000110A,00000003,00000000), ref: 00404A47
                            • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404A5B
                            • GetWindowLongA.USER32(?,000000F0), ref: 00404A8A
                            • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00404A98
                            • ShowWindow.USER32(?,00000005), ref: 00404AA9
                            • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404BAC
                            • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404C11
                            • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00404C26
                            • SendMessageA.USER32(?,00000420,00000000,00000020), ref: 00404C4A
                            • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404C70
                            • ImageList_Destroy.COMCTL32(?), ref: 00404C85
                            • GlobalFree.KERNEL32(?), ref: 00404C95
                            • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00404D05
                            • SendMessageA.USER32(?,00001102,00000410,?), ref: 00404DAE
                            • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 00404DBD
                            • InvalidateRect.USER32(?,00000000,00000001), ref: 00404DDD
                            • ShowWindow.USER32(?,00000000), ref: 00404E2B
                            • GetDlgItem.USER32(?,000003FE), ref: 00404E36
                            • ShowWindow.USER32(00000000), ref: 00404E3D
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1722120987.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1722107573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722136817.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722230617.000000000052B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Uninstall.jbxd
                            Similarity
                            • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                            • String ID: $M$N
                            • API String ID: 1638840714-813528018
                            • Opcode ID: 0e1a33c3e694231fb3390c5c9e17b12e35b4e92da7da87bf5bd91a9e50e2b9fc
                            • Instruction ID: 1183d6f7a9f832480c2a2c99bd38156e4ec5938e1fe9ffba5ec1c0e4999ab2b0
                            • Opcode Fuzzy Hash: 0e1a33c3e694231fb3390c5c9e17b12e35b4e92da7da87bf5bd91a9e50e2b9fc
                            • Instruction Fuzzy Hash: 8A029CB0D00209AFEB11CF65DD45AAE7BB5FB85314F10817AF610BA2E1C7B99A41CF58
                            APIs
                            • GetDlgItem.USER32(?,000003FB), ref: 004043A2
                            • SetWindowTextA.USER32(?,?), ref: 004043CF
                            • SHBrowseForFolderA.SHELL32(?,0042BC70,?), ref: 00404484
                            • CoTaskMemFree.OLE32(00000000), ref: 0040448F
                            • lstrcmpiA.KERNEL32(C:\Users\user\AppData\Local\Temp\~nsu.tmp\Zu_.exe,00431CA0), ref: 004044C1
                            • lstrcatA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\~nsu.tmp\Zu_.exe), ref: 004044CD
                            • SetDlgItemTextA.USER32(?,000003FB,?), ref: 004044DD
                              • Part of subcall function 0040540B: GetDlgItemTextA.USER32(?,?,00002000,00404510), ref: 0040541E
                              • Part of subcall function 00405DC8: CharNextA.USER32(?,*?|<>/":,00000000,00479000,0046F000,00479000,00000000,00403214,00479000,00000000,00403386), ref: 00405E20
                              • Part of subcall function 00405DC8: CharNextA.USER32(?,?,?,00000000), ref: 00405E2D
                              • Part of subcall function 00405DC8: CharNextA.USER32(?,00479000,0046F000,00479000,00000000,00403214,00479000,00000000,00403386), ref: 00405E32
                              • Part of subcall function 00405DC8: CharPrevA.USER32(?,?,0046F000,00479000,00000000,00403214,00479000,00000000,00403386), ref: 00405E42
                            • GetDiskFreeSpaceA.KERNEL32(00429C68,?,?,0000040F,?,00429C68,00429C68,?,00000000,00429C68,?,?,000003FB,?), ref: 00404596
                            • MulDiv.KERNEL32(?,0000040F,00000400), ref: 004045B1
                            • SetDlgItemTextA.USER32(00000000,00000400,00429C58), ref: 0040462A
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1722120987.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1722107573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722136817.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722230617.000000000052B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Uninstall.jbxd
                            Similarity
                            • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpi
                            • String ID: A$C:\Users\user\AppData\Local\Temp\~nsu.tmp\Zu_.exe
                            • API String ID: 2246997448-978382989
                            • Opcode ID: c4ab5f9acc70c33c109baa3c0883ae9a6e2437a1c98b2a2a31c98fc876b6eae3
                            • Instruction ID: 837b9add0ee4c7fa7edda3a2cfc136c172d34a8f6a08fd8700377a4301a7160d
                            • Opcode Fuzzy Hash: c4ab5f9acc70c33c109baa3c0883ae9a6e2437a1c98b2a2a31c98fc876b6eae3
                            • Instruction Fuzzy Hash: 57917EB1900208ABDB11DFA2CD84AAF7BB8EF85354F10447BF604B62D1D77C9A419B69
                            APIs
                            • GetVersion.KERNEL32(?,0042DC78,00000000,00404F3C,0042DC78,00000000), ref: 00405C30
                            • GetSystemDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\~nsu.tmp\Zu_.exe,00002000), ref: 00405CAB
                            • GetWindowsDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\~nsu.tmp\Zu_.exe,00002000), ref: 00405CBE
                            • SHGetSpecialFolderLocation.SHELL32(?,00000000), ref: 00405CFA
                            • SHGetPathFromIDListA.SHELL32(00000000,C:\Users\user\AppData\Local\Temp\~nsu.tmp\Zu_.exe), ref: 00405D08
                            • CoTaskMemFree.OLE32(00000000), ref: 00405D13
                            • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\~nsu.tmp\Zu_.exe,\Microsoft\Internet Explorer\Quick Launch), ref: 00405D35
                            • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\~nsu.tmp\Zu_.exe,?,0042DC78,00000000,00404F3C,0042DC78,00000000), ref: 00405D87
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1722120987.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1722107573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722136817.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722230617.000000000052B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Uninstall.jbxd
                            Similarity
                            • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                            • String ID: C:\Users\user\AppData\Local\Temp\~nsu.tmp\Zu_.exe$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                            • API String ID: 900638850-1509007515
                            • Opcode ID: 088bb6aa19643ac4639f92105eba46d0f8c85c3bc8575449d65d3801c8dcd7b1
                            • Instruction ID: 9e5192f8493aa47ebdc16a38911c6d04ebd0228925298aebbb8fa2a4147c3c24
                            • Opcode Fuzzy Hash: 088bb6aa19643ac4639f92105eba46d0f8c85c3bc8575449d65d3801c8dcd7b1
                            • Instruction Fuzzy Hash: AC510335904A05AAEF215B64DC88B7F3BA4DF56324F24823BE911B62D0D37C5981DF4E
                            APIs
                            • DeleteFileA.KERNEL32(?,?,0046F000,74DF2EE0), ref: 004054A9
                            • lstrcatA.KERNEL32(00439CA8,\*.*,00439CA8,?,00000000,?,0046F000,74DF2EE0), ref: 004054F3
                            • lstrcatA.KERNEL32(?,00409010,?,00439CA8,?,00000000,?,0046F000,74DF2EE0), ref: 00405514
                            • lstrlenA.KERNEL32(?,?,00409010,?,00439CA8,?,00000000,?,0046F000,74DF2EE0), ref: 0040551A
                            • FindFirstFileA.KERNEL32(00439CA8,?,?,?,00409010,?,00439CA8,?,00000000,?,0046F000,74DF2EE0), ref: 0040552B
                            • FindNextFileA.KERNEL32(?,00000010,000000F2,?), ref: 004055DD
                            • FindClose.KERNEL32(?), ref: 004055EE
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1722120987.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1722107573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722136817.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722230617.000000000052B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Uninstall.jbxd
                            Similarity
                            • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                            • String ID: \*.*
                            • API String ID: 2035342205-1173974218
                            • Opcode ID: 62009baea20755743a64f6a36bc5f6423812f01b0c07ebd8a4f50c8588871773
                            • Instruction ID: c21d71015f388e95bcdaf446d79f8f0681b512570eb11bb529d8bb9f749da999
                            • Opcode Fuzzy Hash: 62009baea20755743a64f6a36bc5f6423812f01b0c07ebd8a4f50c8588871773
                            • Instruction Fuzzy Hash: C0510431804A447ADB216B218C45BBF3B79DF42728F14847BF915711D2C73C5A85DE6E
                            APIs
                            • CoCreateInstance.OLE32(00407384,?,00000001,00407374,?,00000000,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402073
                            • MultiByteToWideChar.KERNEL32(?,?,?,000000FF,00409368,00000400,?,00000001,00407374,?,00000000,00000045,000000CD,00000002,000000DF,000000F0), ref: 0040212D
                            Memory Dump Source
                            • Source File: 00000000.00000002.1722120987.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1722107573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722136817.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722230617.000000000052B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Uninstall.jbxd
                            Similarity
                            • API ID: ByteCharCreateInstanceMultiWide
                            • String ID:
                            • API String ID: 123533781-0
                            • Opcode ID: 8b831bab9411c541a496b36cb7f3b9bb8278311742473642f8caf1b0044b4e6e
                            • Instruction ID: 5940827fd3d8acfdb20cb91e5591fd81c6146be5a3dcf74c184eb07012a2b88f
                            • Opcode Fuzzy Hash: 8b831bab9411c541a496b36cb7f3b9bb8278311742473642f8caf1b0044b4e6e
                            • Instruction Fuzzy Hash: 9641AF75A00205AFCB40DFA4CD88E9E7BBAFF48354B204269FA15FB2D0CA799D41CB54
                            APIs
                            • FindFirstFileA.KERNEL32(?,0043E4F0,0043BCA8,0040577D,0043BCA8,0043BCA8,00000000,0043BCA8,0043BCA8,?,?,74DF2EE0,0040549F,?,0046F000,74DF2EE0), ref: 00405E6C
                            • FindClose.KERNEL32(00000000), ref: 00405E78
                            Memory Dump Source
                            • Source File: 00000000.00000002.1722120987.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1722107573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722136817.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722230617.000000000052B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Uninstall.jbxd
                            Similarity
                            • API ID: Find$CloseFileFirst
                            • String ID:
                            • API String ID: 2295610775-0
                            • Opcode ID: 01e595e2f3112a2de1d0a49937830070d80cc3437c46873e90b3c13b0457b4b6
                            • Instruction ID: ad08286ca6cff15a9a126e67a78f5d7bda1c091ca2a48e653f649c3583465e9e
                            • Opcode Fuzzy Hash: 01e595e2f3112a2de1d0a49937830070d80cc3437c46873e90b3c13b0457b4b6
                            • Instruction Fuzzy Hash: 9CD012359495205FC7001739AC0C85B7A58EF593347108B32F969F62E0C7749D52CAED
                            APIs
                            • FindFirstFileA.KERNEL32(00000000,?,00000002), ref: 0040264D
                            Memory Dump Source
                            • Source File: 00000000.00000002.1722120987.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1722107573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722136817.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722230617.000000000052B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Uninstall.jbxd
                            Similarity
                            • API ID: FileFindFirst
                            • String ID:
                            • API String ID: 1974802433-0
                            • Opcode ID: bf92d7814b32302f681bd40fdb9e228ea073e4d71cbcac882ac9a9a5f6c806a4
                            • Instruction ID: 6ae398fb3f52c984721297e6b505dcc5bf61800dadfb0bcb08d50d620a11001a
                            • Opcode Fuzzy Hash: bf92d7814b32302f681bd40fdb9e228ea073e4d71cbcac882ac9a9a5f6c806a4
                            • Instruction Fuzzy Hash: B3F0A7725041019BD700DBB499499EEB7689B51314F60067BE111F20C1C2B859459B2E
                            APIs
                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403A81
                            • ShowWindow.USER32(?), ref: 00403A9E
                            • DestroyWindow.USER32 ref: 00403AB2
                            • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403ACE
                            • GetDlgItem.USER32(?,?), ref: 00403AEF
                            • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403B03
                            • IsWindowEnabled.USER32(00000000), ref: 00403B0A
                            • GetDlgItem.USER32(?,00000001), ref: 00403BB8
                            • GetDlgItem.USER32(?,00000002), ref: 00403BC2
                            • SetClassLongA.USER32(?,000000F2,?), ref: 00403BDC
                            • SendMessageA.USER32(0000040F,00000000,00000001,?), ref: 00403C2D
                            • GetDlgItem.USER32(?,00000003), ref: 00403CD3
                            • ShowWindow.USER32(00000000,?), ref: 00403CF4
                            • EnableWindow.USER32(?,?), ref: 00403D06
                            • EnableWindow.USER32(?,?), ref: 00403D21
                            • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403D37
                            • EnableMenuItem.USER32(00000000), ref: 00403D3E
                            • SendMessageA.USER32(?,000000F4,00000000,00000001), ref: 00403D56
                            • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00403D69
                            • lstrlenA.KERNEL32(00431CA0,?,00431CA0,00442EA0), ref: 00403D92
                            • SetWindowTextA.USER32(?,00431CA0), ref: 00403DA1
                            • ShowWindow.USER32(?,0000000A), ref: 00403ED5
                            Memory Dump Source
                            • Source File: 00000000.00000002.1722120987.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1722107573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722136817.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722230617.000000000052B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Uninstall.jbxd
                            Similarity
                            • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
                            • String ID:
                            • API String ID: 184305955-0
                            • Opcode ID: b4f51a569deccd6f3493512b7ddc09a36627d2e63de436a3da0c16f408f16889
                            • Instruction ID: 1fd14b61aacdda538f00b8b16eb253fda244b111fbceed3359c2b62430d0d08c
                            • Opcode Fuzzy Hash: b4f51a569deccd6f3493512b7ddc09a36627d2e63de436a3da0c16f408f16889
                            • Instruction Fuzzy Hash: 7EC1A075904204ABDB20AF21ED89E2B3E7CEB5670AF50053EF541B11F1C77AA941DB2E
                            APIs
                              • Part of subcall function 00405E88: GetModuleHandleA.KERNEL32(?,?,00000000,0040327F,00000008), ref: 00405E9A
                              • Part of subcall function 00405E88: LoadLibraryA.KERNELBASE(?,?,00000000,0040327F,00000008), ref: 00405EA5
                              • Part of subcall function 00405E88: GetProcAddress.KERNEL32(00000000,?), ref: 00405EB6
                            • lstrcatA.KERNEL32(00477000,00431CA0,80000001,Control Panel\Desktop\ResourceLocale,00000000,00431CA0,00000000,00000006,0046F000,00000000,00479000,00000000), ref: 00403720
                            • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\~nsu.tmp\Zu_.exe,?,?,?,C:\Users\user\AppData\Local\Temp\~nsu.tmp\Zu_.exe,00000000,00471000,00477000,00431CA0,80000001,Control Panel\Desktop\ResourceLocale,00000000,00431CA0,00000000,00000006,0046F000), ref: 00403795
                            • lstrcmpiA.KERNEL32(?,.exe), ref: 004037A8
                            • GetFileAttributesA.KERNEL32(C:\Users\user\AppData\Local\Temp\~nsu.tmp\Zu_.exe), ref: 004037B3
                            • LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,00471000), ref: 004037FC
                              • Part of subcall function 00405AC4: wsprintfA.USER32 ref: 00405AD1
                            • RegisterClassA.USER32 ref: 00403843
                            • SystemParametersInfoA.USER32(00000030,00000000,_Nb,00000000), ref: 0040385B
                            • CreateWindowExA.USER32(00000080,?,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403894
                            • ShowWindow.USER32(00000005,00000000), ref: 004038CA
                            • LoadLibraryA.KERNEL32(RichEd20), ref: 004038DB
                            • LoadLibraryA.KERNEL32(RichEd32), ref: 004038E6
                            • GetClassInfoA.USER32(00000000,RichEdit20A,00442E40), ref: 004038F6
                            • GetClassInfoA.USER32(00000000,RichEdit,00442E40), ref: 00403903
                            • RegisterClassA.USER32(00442E40), ref: 0040390C
                            • DialogBoxParamA.USER32(?,00000000,00403A45,00000000), ref: 0040392B
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1722120987.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1722107573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722136817.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722230617.000000000052B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Uninstall.jbxd
                            Similarity
                            • API ID: ClassLoad$InfoLibrary$RegisterWindow$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                            • String ID: .DEFAULT\Control Panel\International$.exe$@.D$C:\Users\user\AppData\Local\Temp\~nsu.tmp\Zu_.exe$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                            • API String ID: 914957316-2126306940
                            • Opcode ID: 37261a5dc7353b0e66c3586d2152ef1fe1a8c9b0db62de6cfcd712c82bfdfbe7
                            • Instruction ID: 3542310957e084efa4f7071889cf7bf748f4eb568de54123e821ab1392b17e28
                            • Opcode Fuzzy Hash: 37261a5dc7353b0e66c3586d2152ef1fe1a8c9b0db62de6cfcd712c82bfdfbe7
                            • Instruction Fuzzy Hash: 8161E3B46442007FE710AF619D45F2B3AACEB4675AF50443FF940B22E1D7B8AD00CA2E
                            APIs
                            • CheckDlgButton.USER32(00000000,-0000040A,00000001), ref: 004040EB
                            • GetDlgItem.USER32(00000000,000003E8), ref: 004040FF
                            • SendMessageA.USER32(00000000,0000045B,00000001,00000000), ref: 0040411D
                            • GetSysColor.USER32(?), ref: 0040412E
                            • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 0040413D
                            • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 0040414C
                            • lstrlenA.KERNEL32(?), ref: 00404156
                            • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 00404164
                            • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 00404173
                            • GetDlgItem.USER32(?,0000040A), ref: 004041D6
                            • SendMessageA.USER32(00000000), ref: 004041D9
                            • GetDlgItem.USER32(?,000003E8), ref: 00404204
                            • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 00404244
                            • LoadCursorA.USER32(00000000,00007F02), ref: 00404253
                            • SetCursor.USER32(00000000), ref: 0040425C
                            • ShellExecuteA.SHELL32(0000070B,open,@C,00000000,00000000,00000001), ref: 0040426F
                            • LoadCursorA.USER32(00000000,00007F00), ref: 0040427C
                            • SetCursor.USER32(00000000), ref: 0040427F
                            • SendMessageA.USER32(00000111,00000001,00000000), ref: 004042AB
                            • SendMessageA.USER32(00000010,00000000,00000000), ref: 004042BF
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1722120987.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1722107573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722136817.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722230617.000000000052B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Uninstall.jbxd
                            Similarity
                            • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                            • String ID: @C$N$open
                            • API String ID: 3615053054-560641889
                            • Opcode ID: 7eb73afa992198c4f98a95f14df475cedb7533b9faad63bc5bef38095aed9e24
                            • Instruction ID: 3a1959b9348cc4f2966bed60e082faf824cb7eb55f7dfb2b2a637252ef2f0b8f
                            • Opcode Fuzzy Hash: 7eb73afa992198c4f98a95f14df475cedb7533b9faad63bc5bef38095aed9e24
                            • Instruction Fuzzy Hash: 4F61BFB1A40309BFEB109F60DC45F6A3B69FB44755F10807AFB04BA2D1C7B8A951CB99
                            APIs
                            • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                            • BeginPaint.USER32(?,?), ref: 00401047
                            • GetClientRect.USER32(?,?), ref: 0040105B
                            • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                            • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                            • DeleteObject.GDI32(?), ref: 004010ED
                            • CreateFontIndirectA.GDI32(?), ref: 00401105
                            • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                            • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                            • SelectObject.GDI32(00000000,?), ref: 00401140
                            • DrawTextA.USER32(00000000,00442EA0,000000FF,00000010,00000820), ref: 00401156
                            • SelectObject.GDI32(00000000,00000000), ref: 00401160
                            • DeleteObject.GDI32(?), ref: 00401165
                            • EndPaint.USER32(?,?), ref: 0040116E
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1722120987.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1722107573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722136817.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722230617.000000000052B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Uninstall.jbxd
                            Similarity
                            • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                            • String ID: F
                            • API String ID: 941294808-1304234792
                            • Opcode ID: 055318d4bc47e4a764edf33350f334e63965e525b0f85424403fd80477bc7367
                            • Instruction ID: ad11f47ad4c56fba0198c5e023b152b535431d91685ad324ade778771994e4e2
                            • Opcode Fuzzy Hash: 055318d4bc47e4a764edf33350f334e63965e525b0f85424403fd80477bc7367
                            • Instruction Fuzzy Hash: 68419A72804249AFCB058FA5CD459BFBBB9FF45314F00812AF951AA1A0C778AA50DFA5
                            APIs
                            • GetWindowLongA.USER32(?,000000EB), ref: 00403F9C
                            • GetSysColor.USER32(00000000), ref: 00403FB8
                            • SetTextColor.GDI32(?,00000000), ref: 00403FC4
                            • SetBkMode.GDI32(?,?), ref: 00403FD0
                            • GetSysColor.USER32(?), ref: 00403FE3
                            • SetBkColor.GDI32(?,?), ref: 00403FF3
                            • DeleteObject.GDI32(?), ref: 0040400D
                            • CreateBrushIndirect.GDI32(?), ref: 00404017
                            Memory Dump Source
                            • Source File: 00000000.00000002.1722120987.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1722107573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722136817.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722230617.000000000052B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Uninstall.jbxd
                            Similarity
                            • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                            • String ID:
                            • API String ID: 2320649405-0
                            • Opcode ID: 54c4c26d0880f537c7164b4e2121e342b47f232b14c6c2566c024284623f766e
                            • Instruction ID: 4cc26f8bf5fc777f430f8318c3ba194748f169832e683f7fcd21add738ba3f9d
                            • Opcode Fuzzy Hash: 54c4c26d0880f537c7164b4e2121e342b47f232b14c6c2566c024284623f766e
                            • Instruction Fuzzy Hash: C221C371904705ABCB209F78DD08B4BBBF8AF40711F048A29F992F26E0C738E904CB55
                            APIs
                            • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,000000F0), ref: 004026D0
                            • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,000000F0), ref: 004026EC
                            • GlobalFree.KERNEL32(?), ref: 00402725
                            • WriteFile.KERNEL32(FFFFFD66,00000000,?,FFFFFD66,?,?,?,?,000000F0), ref: 00402737
                            • GlobalFree.KERNEL32(00000000), ref: 0040273E
                            • CloseHandle.KERNEL32(FFFFFD66,?,?,000000F0), ref: 00402756
                            • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,000000F0), ref: 0040276A
                            Memory Dump Source
                            • Source File: 00000000.00000002.1722120987.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1722107573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722136817.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722230617.000000000052B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Uninstall.jbxd
                            Similarity
                            • API ID: Global$AllocFileFree$CloseDeleteHandleWrite
                            • String ID:
                            • API String ID: 3294113728-0
                            • Opcode ID: c3a075b99b10f16fe81905acb2740d1399eaf426bce7a51db518b858d54e2138
                            • Instruction ID: 139215c225530ed05a72f165aec94188ca6d0ffd2e2debb4f1ded45b97d75f17
                            • Opcode Fuzzy Hash: c3a075b99b10f16fe81905acb2740d1399eaf426bce7a51db518b858d54e2138
                            • Instruction Fuzzy Hash: BF31AD71C00128BBDF216FA4CD89DAE7E78EF09364F10423AF920772E0C6795D419BA9
                            APIs
                            • lstrlenA.KERNEL32(0042DC78,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C4A,00000000,?), ref: 00404F3D
                            • lstrlenA.KERNEL32(00402C4A,0042DC78,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C4A,00000000), ref: 00404F4D
                            • lstrcatA.KERNEL32(0042DC78,00402C4A,00402C4A,0042DC78,00000000,00000000,00000000), ref: 00404F60
                            • SetWindowTextA.USER32(0042DC78,0042DC78), ref: 00404F72
                            • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404F98
                            • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404FB2
                            • SendMessageA.USER32(?,00001013,?,00000000), ref: 00404FC0
                            Memory Dump Source
                            • Source File: 00000000.00000002.1722120987.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1722107573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722136817.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722230617.000000000052B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Uninstall.jbxd
                            Similarity
                            • API ID: MessageSend$lstrlen$TextWindowlstrcat
                            • String ID:
                            • API String ID: 2531174081-0
                            • Opcode ID: 5c433b9d1919233fe057bb373fe17f09c05b4435df315aeb336d2a0590a8cccc
                            • Instruction ID: 2fc55b577d604e71a684dab85a3a394c861f11f73c7a4afdaccd6d4ddf25b775
                            • Opcode Fuzzy Hash: 5c433b9d1919233fe057bb373fe17f09c05b4435df315aeb336d2a0590a8cccc
                            • Instruction Fuzzy Hash: 98218CB1900119BBDB019FA5DD8499EBFB9EF49354F14807AFA04B6290C3789E40CB68
                            APIs
                            • DestroyWindow.USER32(00000000,00000000), ref: 00402BEB
                            • GetTickCount.KERNEL32 ref: 00402C09
                            • wsprintfA.USER32 ref: 00402C37
                              • Part of subcall function 00404F04: lstrlenA.KERNEL32(0042DC78,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C4A,00000000,?), ref: 00404F3D
                              • Part of subcall function 00404F04: lstrlenA.KERNEL32(00402C4A,0042DC78,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C4A,00000000), ref: 00404F4D
                              • Part of subcall function 00404F04: lstrcatA.KERNEL32(0042DC78,00402C4A,00402C4A,0042DC78,00000000,00000000,00000000), ref: 00404F60
                              • Part of subcall function 00404F04: SetWindowTextA.USER32(0042DC78,0042DC78), ref: 00404F72
                              • Part of subcall function 00404F04: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404F98
                              • Part of subcall function 00404F04: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404FB2
                              • Part of subcall function 00404F04: SendMessageA.USER32(?,00001013,?,00000000), ref: 00404FC0
                            • CreateDialogParamA.USER32(0000006F,00000000,00402B3B,00000000), ref: 00402C5B
                            • ShowWindow.USER32(00000000,00000005), ref: 00402C69
                              • Part of subcall function 00402BB7: MulDiv.KERNEL32(00000000,00000064,00000004), ref: 00402BCC
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1722120987.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1722107573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722136817.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722230617.000000000052B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Uninstall.jbxd
                            Similarity
                            • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                            • String ID: ... %d%%
                            • API String ID: 722711167-2449383134
                            • Opcode ID: 02cd7cf1b4c9dc1e06d43a13f06a46c1327bce63474e00e6603fffb3150c81e6
                            • Instruction ID: d503382bffdb6877589bf5e9d8f4d3b6a3320859dd1babf1ed2f4cbaa8b03d3e
                            • Opcode Fuzzy Hash: 02cd7cf1b4c9dc1e06d43a13f06a46c1327bce63474e00e6603fffb3150c81e6
                            • Instruction Fuzzy Hash: 2501A170809214EBD7219F61EE4DA9F77A8BB01701B10403BF901F11E9DAB89901DBEF
                            APIs
                            • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 004047EE
                            • GetMessagePos.USER32 ref: 004047F6
                            • ScreenToClient.USER32(?,?), ref: 00404810
                            • SendMessageA.USER32(?,00001111,00000000,?), ref: 00404822
                            • SendMessageA.USER32(?,0000110C,00000000,?), ref: 00404848
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1722120987.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1722107573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722136817.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722230617.000000000052B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Uninstall.jbxd
                            Similarity
                            • API ID: Message$Send$ClientScreen
                            • String ID: f
                            • API String ID: 41195575-1993550816
                            • Opcode ID: 2a5698d5089c35727aab5c3c5da7bcfb0b51a0b1d2cb1bbeaafe9db8233e3477
                            • Instruction ID: 01d6173a61c3c3b4b037133c9a52f1e04ee3049876a8ff08b59bebc5d15cf036
                            • Opcode Fuzzy Hash: 2a5698d5089c35727aab5c3c5da7bcfb0b51a0b1d2cb1bbeaafe9db8233e3477
                            • Instruction Fuzzy Hash: BA018075D40218BADB00DB94CC41BFEBBBCAB55711F10412ABB00B61C0C3B46501CB95
                            APIs
                            • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402B56
                            • wsprintfA.USER32 ref: 00402B8A
                            • SetWindowTextA.USER32(?,?), ref: 00402B9A
                            • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402BAC
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1722120987.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1722107573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722136817.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722230617.000000000052B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Uninstall.jbxd
                            Similarity
                            • API ID: Text$ItemTimerWindowwsprintf
                            • String ID: unpacking data: %d%%$verifying installer: %d%%
                            • API String ID: 1451636040-1158693248
                            • Opcode ID: 9af37322b4a8c4315db75c794ccca9b4a5d46a3d1f417319ca6675d20cac232d
                            • Instruction ID: 42736c47b098eae16a91b662ba86b6af227696c677de4a6351d43f215c84d625
                            • Opcode Fuzzy Hash: 9af37322b4a8c4315db75c794ccca9b4a5d46a3d1f417319ca6675d20cac232d
                            • Instruction Fuzzy Hash: 86F03671900109ABEF259F51DD0ABEE3779EB00305F008036FA05B51D1D7F9AA559F99
                            APIs
                            • GetModuleHandleA.KERNEL32(00000000,00000001,000000F0), ref: 00401F7C
                              • Part of subcall function 00404F04: lstrlenA.KERNEL32(0042DC78,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C4A,00000000,?), ref: 00404F3D
                              • Part of subcall function 00404F04: lstrlenA.KERNEL32(00402C4A,0042DC78,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C4A,00000000), ref: 00404F4D
                              • Part of subcall function 00404F04: lstrcatA.KERNEL32(0042DC78,00402C4A,00402C4A,0042DC78,00000000,00000000,00000000), ref: 00404F60
                              • Part of subcall function 00404F04: SetWindowTextA.USER32(0042DC78,0042DC78), ref: 00404F72
                              • Part of subcall function 00404F04: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404F98
                              • Part of subcall function 00404F04: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404FB2
                              • Part of subcall function 00404F04: SendMessageA.USER32(?,00001013,?,00000000), ref: 00404FC0
                            • LoadLibraryExA.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 00401F8C
                            • GetProcAddress.KERNEL32(00000000,?), ref: 00401F9C
                            • FreeLibrary.KERNEL32(00000000,00000000,000000F7,?,?,00000008,00000001,000000F0), ref: 00402007
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1722120987.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1722107573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722136817.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722230617.000000000052B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Uninstall.jbxd
                            Similarity
                            • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                            • String ID: oD
                            • API String ID: 2987980305-1423469843
                            • Opcode ID: aa3bd6656b727ffeb89295934e2ec15f0bb95f9d8d152917cfc451ee600f519d
                            • Instruction ID: bdc715ebbed8c2eda9ea234d2d213aec03b0b01e395bd1d50e003243710bed61
                            • Opcode Fuzzy Hash: aa3bd6656b727ffeb89295934e2ec15f0bb95f9d8d152917cfc451ee600f519d
                            • Instruction Fuzzy Hash: 10212B32D04216ABCF207FA4CE89AAE75B0AB45398F20463BF511B62E1D77C4D41A65E
                            APIs
                            • CharNextA.USER32(?,*?|<>/":,00000000,00479000,0046F000,00479000,00000000,00403214,00479000,00000000,00403386), ref: 00405E20
                            • CharNextA.USER32(?,?,?,00000000), ref: 00405E2D
                            • CharNextA.USER32(?,00479000,0046F000,00479000,00000000,00403214,00479000,00000000,00403386), ref: 00405E32
                            • CharPrevA.USER32(?,?,0046F000,00479000,00000000,00403214,00479000,00000000,00403386), ref: 00405E42
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1722120987.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1722107573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722136817.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722230617.000000000052B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Uninstall.jbxd
                            Similarity
                            • API ID: Char$Next$Prev
                            • String ID: *?|<>/":
                            • API String ID: 589700163-165019052
                            • Opcode ID: d60fa47d96b079028a76cfcdb2d30976ede71f36b1f4f1e1bc9c50cb25bd2be5
                            • Instruction ID: 3b6179abbfe29fc78842bf11aa846075366cc437f950451d76d565b88bc2b460
                            • Opcode Fuzzy Hash: d60fa47d96b079028a76cfcdb2d30976ede71f36b1f4f1e1bc9c50cb25bd2be5
                            • Instruction Fuzzy Hash: A0110861805B9129EB3227284C48BBB7F89CF66754F18447FD8C4722C2C67C5D429FAD
                            APIs
                            • lstrcatA.KERNEL32(00000000,00000000,00409B70,00473000,00000000,00000000,00000031), ref: 00401773
                            • CompareFileTime.KERNEL32(-00000014,?,00409B70,00409B70,00000000,00000000,00409B70,00473000,00000000,00000000,00000031), ref: 0040179D
                              • Part of subcall function 00405B66: lstrcpynA.KERNEL32(?,?,00002000,004032AA,00442EA0,NSIS Error), ref: 00405B73
                              • Part of subcall function 00404F04: lstrlenA.KERNEL32(0042DC78,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C4A,00000000,?), ref: 00404F3D
                              • Part of subcall function 00404F04: lstrlenA.KERNEL32(00402C4A,0042DC78,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C4A,00000000), ref: 00404F4D
                              • Part of subcall function 00404F04: lstrcatA.KERNEL32(0042DC78,00402C4A,00402C4A,0042DC78,00000000,00000000,00000000), ref: 00404F60
                              • Part of subcall function 00404F04: SetWindowTextA.USER32(0042DC78,0042DC78), ref: 00404F72
                              • Part of subcall function 00404F04: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404F98
                              • Part of subcall function 00404F04: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404FB2
                              • Part of subcall function 00404F04: SendMessageA.USER32(?,00001013,?,00000000), ref: 00404FC0
                            Memory Dump Source
                            • Source File: 00000000.00000002.1722120987.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1722107573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722136817.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722230617.000000000052B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Uninstall.jbxd
                            Similarity
                            • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                            • String ID:
                            • API String ID: 1941528284-0
                            • Opcode ID: bcffe38cf0625ffddfb22b7a3aadbbe6959021bc8cf5848348ca87b96c5d944c
                            • Instruction ID: 387613274165ae398735932c2abc0a0b51f1de13e66d7cff8d2fd5b5c87d53b9
                            • Opcode Fuzzy Hash: bcffe38cf0625ffddfb22b7a3aadbbe6959021bc8cf5848348ca87b96c5d944c
                            • Instruction Fuzzy Hash: BA41E531900515BBCB10BFB5DD46EAF3A79EF02369B20433BF511B11E1D63C5A418AAE
                            APIs
                            • RegOpenKeyExA.ADVAPI32(?,?,00000000,?,?), ref: 00402A57
                            • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402A93
                            • RegCloseKey.ADVAPI32(?), ref: 00402A9C
                            • RegCloseKey.ADVAPI32(?), ref: 00402AC1
                            • RegDeleteKeyA.ADVAPI32(?,?), ref: 00402ADF
                            Memory Dump Source
                            • Source File: 00000000.00000002.1722120987.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1722107573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722136817.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722230617.000000000052B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Uninstall.jbxd
                            Similarity
                            • API ID: Close$DeleteEnumOpen
                            • String ID:
                            • API String ID: 1912718029-0
                            • Opcode ID: 3379485738d87ea4489a121fc5fe0e7c5314169862274de7ec56f73532940607
                            • Instruction ID: 259584080012af4a033af28bf2d78e0e72ca5e45c602eb3588b612967464464b
                            • Opcode Fuzzy Hash: 3379485738d87ea4489a121fc5fe0e7c5314169862274de7ec56f73532940607
                            • Instruction Fuzzy Hash: 4B116A75600009FFDF219F90DE48DAF7B6DEB41344B104436F945A00E0DBB49E55AF6A
                            APIs
                            • GetDlgItem.USER32(?), ref: 00401CC5
                            • GetClientRect.USER32(00000000,?), ref: 00401CD2
                            • LoadImageA.USER32(?,00000000,?,?,?,?), ref: 00401CF3
                            • SendMessageA.USER32(00000000,00000172,?,00000000), ref: 00401D01
                            • DeleteObject.GDI32(00000000), ref: 00401D10
                            Memory Dump Source
                            • Source File: 00000000.00000002.1722120987.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1722107573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722136817.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722230617.000000000052B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Uninstall.jbxd
                            Similarity
                            • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                            • String ID:
                            • API String ID: 1849352358-0
                            • Opcode ID: 1287b685b981209588b0c59fc6f246be62162b0e9befa8d8972b60fe26002a3e
                            • Instruction ID: 086d5b446e16212717cf7668c87d994395aec52f986300cbf4c27fae309feacd
                            • Opcode Fuzzy Hash: 1287b685b981209588b0c59fc6f246be62162b0e9befa8d8972b60fe26002a3e
                            • Instruction Fuzzy Hash: 91F01DB2E04105BFD700EBA4EE89DAFB7BDEB44345B104576F602F2190C6789D018B69
                            APIs
                            • lstrlenA.KERNEL32(00431CA0,00431CA0,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,00404611,000000DF,0000040F,00000400,00000000), ref: 0040477F
                            • wsprintfA.USER32 ref: 00404787
                            • SetDlgItemTextA.USER32(?,00431CA0), ref: 0040479A
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1722120987.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1722107573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722136817.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722230617.000000000052B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Uninstall.jbxd
                            Similarity
                            • API ID: ItemTextlstrlenwsprintf
                            • String ID: %u.%u%s%s
                            • API String ID: 3540041739-3551169577
                            • Opcode ID: d88b1909310242b71c322c81ec026df4f0a2953a5b23512ca8fb632b4258ee74
                            • Instruction ID: 36010866de4d4973df748f9dd838e75dfff237001bd6de138a618f82c9ba1ae9
                            • Opcode Fuzzy Hash: d88b1909310242b71c322c81ec026df4f0a2953a5b23512ca8fb632b4258ee74
                            • Instruction Fuzzy Hash: 16113473A001243BDB00626D8C45EEF3259CBD6335F14023BFA25F71D1E978AC1282E8
                            APIs
                            • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C0D
                            • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401C25
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1722120987.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1722107573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722136817.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722230617.000000000052B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Uninstall.jbxd
                            Similarity
                            • API ID: MessageSend$Timeout
                            • String ID: !
                            • API String ID: 1777923405-2657877971
                            • Opcode ID: a869fc4ed9d69aa89ddab629416d3bed9472318dc20609659f67b64c2dc426d5
                            • Instruction ID: d701d1914d9a432f1ee94957cc89600c82e7343f4fc37ddb5fc3d32b609c0d77
                            • Opcode Fuzzy Hash: a869fc4ed9d69aa89ddab629416d3bed9472318dc20609659f67b64c2dc426d5
                            • Instruction Fuzzy Hash: D821C4B1A44209BFEF01AFB4CE4AAAE7B75EF44344F14053EF602B60D1D6B84980E718
                            APIs
                            • RegCreateKeyExA.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 00402341
                            • lstrlenA.KERNEL32(0040DB70,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 00402361
                            • RegSetValueExA.ADVAPI32(?,?,?,?,0040DB70,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 0040239A
                            • RegCloseKey.ADVAPI32(?,?,?,0040DB70,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 0040247D
                            Memory Dump Source
                            • Source File: 00000000.00000002.1722120987.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1722107573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722136817.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722230617.000000000052B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Uninstall.jbxd
                            Similarity
                            • API ID: CloseCreateValuelstrlen
                            • String ID:
                            • API String ID: 1356686001-0
                            • Opcode ID: 8b33dd6d6b2b8ed07ef4678f841582e7408791eb548e0479778c362945471d50
                            • Instruction ID: 296c73fb00ad4de5de759cf5fdeaac1d87e05e13d386f830c03a67a49eb44fa0
                            • Opcode Fuzzy Hash: 8b33dd6d6b2b8ed07ef4678f841582e7408791eb548e0479778c362945471d50
                            • Instruction Fuzzy Hash: 261160B1E00109BFEB10AFA0DE49EAF767DFB54398F10413AF905B61D0D6B85D019669
                            APIs
                              • Part of subcall function 004056ED: CharNextA.USER32(0040549F,?,0043BCA8,00000000,00405751,0043BCA8,0043BCA8,?,?,74DF2EE0,0040549F,?,0046F000,74DF2EE0), ref: 004056FB
                              • Part of subcall function 004056ED: CharNextA.USER32(00000000), ref: 00405700
                              • Part of subcall function 004056ED: CharNextA.USER32(00000000), ref: 0040570F
                            • CreateDirectoryA.KERNEL32(00000000,?,00000000,0000005C,00000000,000000F0), ref: 004015DB
                            • GetLastError.KERNEL32(?,00000000,0000005C,00000000,000000F0), ref: 004015E5
                            • GetFileAttributesA.KERNEL32(00000000,?,00000000,0000005C,00000000,000000F0), ref: 004015F3
                            • SetCurrentDirectoryA.KERNEL32(00000000,00473000,00000000,00000000,000000F0), ref: 00401622
                            Memory Dump Source
                            • Source File: 00000000.00000002.1722120987.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1722107573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722136817.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722230617.000000000052B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Uninstall.jbxd
                            Similarity
                            • API ID: CharNext$Directory$AttributesCreateCurrentErrorFileLast
                            • String ID:
                            • API String ID: 3751793516-0
                            • Opcode ID: 5b00c1ef3ae773a6d77c22359f08be701cdee15cca4b29b31090401c75d27140
                            • Instruction ID: 1bea97f6ad753e655b82da7d5523b655d2584313a213d434da7226bf4f447ea8
                            • Opcode Fuzzy Hash: 5b00c1ef3ae773a6d77c22359f08be701cdee15cca4b29b31090401c75d27140
                            • Instruction Fuzzy Hash: 790108318081419FDB116F751D4497F6BB0AA56369724073FF491B22E2C63C0941962E
                            APIs
                            • GetFileVersionInfoSizeA.VERSION(00000000,?,000000EE), ref: 00401ED4
                            • GlobalAlloc.KERNEL32(00000040,00000000,00000000,?,000000EE), ref: 00401EF2
                            • GetFileVersionInfoA.VERSION(?,?,?,00000000), ref: 00401F0B
                            • VerQueryValueA.VERSION(?,00409010,?,?,?,?,?,00000000), ref: 00401F24
                              • Part of subcall function 00405AC4: wsprintfA.USER32 ref: 00405AD1
                            Memory Dump Source
                            • Source File: 00000000.00000002.1722120987.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1722107573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722136817.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722230617.000000000052B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Uninstall.jbxd
                            Similarity
                            • API ID: FileInfoVersion$AllocGlobalQuerySizeValuewsprintf
                            • String ID:
                            • API String ID: 1404258612-0
                            • Opcode ID: 533bbaa52b75f52b026b180ddfe2c12257574f1b88f86b37d6c92ef85265d070
                            • Instruction ID: 469f1bc5c2da8f7bf21418c9fa7c855411c387b6ab03f9ca10b763bcdfe7d214
                            • Opcode Fuzzy Hash: 533bbaa52b75f52b026b180ddfe2c12257574f1b88f86b37d6c92ef85265d070
                            • Instruction Fuzzy Hash: 4F113A71A00108BEDB01EFA5DD819AEBBB9EB49344B20853AF501F61E1D7389A54DB28
                            APIs
                            • GetDC.USER32(?), ref: 00401D22
                            • GetDeviceCaps.GDI32(00000000), ref: 00401D29
                            • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D38
                            • CreateFontIndirectA.GDI32(00413B74), ref: 00401D8A
                            Memory Dump Source
                            • Source File: 00000000.00000002.1722120987.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1722107573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722136817.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722230617.000000000052B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Uninstall.jbxd
                            Similarity
                            • API ID: CapsCreateDeviceFontIndirect
                            • String ID:
                            • API String ID: 3272661963-0
                            • Opcode ID: f773f28dbc82b117281100af00a35109cec4549a2863c8757596b2bdf6898e11
                            • Instruction ID: dbc87e4f6ee83b20b8f61a8a7c3942786851e2433e4431165b402845567ff4dd
                            • Opcode Fuzzy Hash: f773f28dbc82b117281100af00a35109cec4549a2863c8757596b2bdf6898e11
                            • Instruction Fuzzy Hash: D0F0A470A8C240AFE7016BB0AD0ABD93F649721317F10446AF141BA1E3D57C21009B7E
                            APIs
                            • IsWindowVisible.USER32(?), ref: 00404E8A
                            • CallWindowProcA.USER32(?,00000200,?,?), ref: 00404EF8
                              • Part of subcall function 00403F64: SendMessageA.USER32(?,00000000,00000000,00000000), ref: 00403F76
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1722120987.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1722107573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722136817.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722230617.000000000052B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Uninstall.jbxd
                            Similarity
                            • API ID: Window$CallMessageProcSendVisible
                            • String ID:
                            • API String ID: 3748168415-3916222277
                            • Opcode ID: a84b5296b4eeae82f408269d2d1b8d7033f61a03f51c3bbd89419221396ae481
                            • Instruction ID: 574ffcac201dacb39b42018bad0bebdbc1389d908601d56a0bf61ad4508792f4
                            • Opcode Fuzzy Hash: a84b5296b4eeae82f408269d2d1b8d7033f61a03f51c3bbd89419221396ae481
                            • Instruction Fuzzy Hash: D6114F71940208BBEF21AF52DC4499F3729FB45769F00803BF604792E1C77D5A519BAD
                            APIs
                            • lstrlenA.KERNEL32(00000000,?,00000000,00000000,004059C0,00000000,[Rename],?,?,00000000,000000F1,?), ref: 004057B9
                            • lstrcmpiA.KERNEL32(00000000,00000000), ref: 004057D2
                            • CharNextA.USER32(00000000,?,?,00000000,000000F1,?), ref: 004057E0
                            • lstrlenA.KERNEL32(00000000,00000000,?,00000000,00000000,004059C0,00000000,[Rename],?,?,00000000,000000F1,?), ref: 004057E9
                            Memory Dump Source
                            • Source File: 00000000.00000002.1722120987.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1722107573.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722136817.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722149697.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1722230617.000000000052B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Uninstall.jbxd
                            Similarity
                            • API ID: lstrlen$CharNextlstrcmpi
                            • String ID:
                            • API String ID: 190613189-0
                            • Opcode ID: 0108cf067d6f6d80c8ed850288af8a4b3b9133f156f8bdff26d83f0dd252fb59
                            • Instruction ID: 042c172281cf084eebf1820456e7eb749b121a10276c912c68532230cfd8689c
                            • Opcode Fuzzy Hash: 0108cf067d6f6d80c8ed850288af8a4b3b9133f156f8bdff26d83f0dd252fb59
                            • Instruction Fuzzy Hash: BBF0A736249D51DBC2029B295C44E6FBEA4EF95355F14057EF440F3180D335AC11ABBB

                            Execution Graph

                            Execution Coverage:4.6%
                            Dynamic/Decrypted Code Coverage:26%
                            Signature Coverage:10.4%
                            Total number of Nodes:1269
                            Total number of Limit Nodes:68
                            execution_graph 32579 2502930 32580 2502940 VirtualProtect 32579->32580 32581 250297b 32579->32581 32580->32581 32582 6d91c59 SendMessageA ShowWindow 32583 6d91c8d 32582->32583 32584 6d91cde SetWindowLongA 32582->32584 32585 6d91c94 KiUserCallbackDispatcher IsDialogMessageA 32583->32585 32588 6d91cdd 32583->32588 32585->32583 32586 6d91cb1 IsDialogMessageA 32585->32586 32586->32583 32587 6d91cc1 TranslateMessage DispatchMessageA 32586->32587 32587->32583 32588->32584 32589 6d91759 32590 6d9178a 32589->32590 32598 6d91fc2 32590->32598 32592 6d9179e GetDlgItem GetWindowRect MapWindowPoints CreateDialogParamA 32593 6d917eb SetWindowPos SetWindowLongA GetProcessHeap HeapAlloc 32592->32593 32594 6d917df 32592->32594 32597 6d9184e 32593->32597 32601 6d91e27 GlobalAlloc lstrcpynA 32594->32601 32596 6d917e9 32596->32597 32602 6d91dd9 32598->32602 32600 6d91fd9 32600->32592 32601->32596 32603 6d91e20 32602->32603 32605 6d91de3 32602->32605 32603->32600 32604 6d91e11 GlobalFree 32604->32603 32605->32603 32605->32604 32606 6d91dfd lstrcpynA 32605->32606 32606->32604 32607 401721 32613 4029f6 32607->32613 32611 40172f 32612 40586c 2 API calls 32611->32612 32612->32611 32614 402a02 32613->32614 32623 405b88 32614->32623 32617 401728 32619 40586c 32617->32619 32620 405877 GetTickCount GetTempFileNameA 32619->32620 32621 4058a7 32620->32621 32622 4058a3 32620->32622 32621->32611 32622->32620 32622->32621 32639 405b95 32623->32639 32624 405daf 32625 402a23 32624->32625 32657 405b66 lstrcpynA 32624->32657 32625->32617 32641 405dc8 32625->32641 32627 405c2d GetVersion 32627->32639 32628 405d86 lstrlenA 32628->32639 32631 405b88 10 API calls 32631->32628 32633 405ca5 GetSystemDirectoryA 32633->32639 32634 405cb8 GetWindowsDirectoryA 32634->32639 32635 405dc8 5 API calls 32635->32639 32636 405cec SHGetSpecialFolderLocation 32636->32639 32640 405d04 SHGetPathFromIDListA CoTaskMemFree 32636->32640 32637 405b88 10 API calls 32637->32639 32638 405d2f lstrcatA 32638->32639 32639->32624 32639->32627 32639->32628 32639->32631 32639->32633 32639->32634 32639->32635 32639->32636 32639->32637 32639->32638 32650 405a4d RegOpenKeyExA 32639->32650 32655 405ac4 wsprintfA 32639->32655 32656 405b66 lstrcpynA 32639->32656 32640->32639 32642 405dd4 32641->32642 32644 405e31 CharNextA 32642->32644 32647 405e3c 32642->32647 32648 405e1f CharNextA 32642->32648 32649 405e2c CharNextA 32642->32649 32658 405684 32642->32658 32643 405e40 CharPrevA 32643->32647 32644->32642 32644->32647 32645 405e5b 32645->32617 32647->32643 32647->32645 32648->32642 32649->32644 32651 405a80 RegQueryValueExA 32650->32651 32652 405abe 32650->32652 32653 405aa1 RegCloseKey 32651->32653 32652->32639 32653->32652 32655->32639 32656->32639 32657->32625 32659 40568a 32658->32659 32660 40569d 32659->32660 32661 405690 CharNextA 32659->32661 32660->32642 32661->32659 32662 6e5b1f78 32663 6e5b1fbd 32662->32663 32670 6e5a3c23 32663->32670 32671 6e5a3c2f __EH_prolog3_GS 32670->32671 32689 6e5ad008 GetCurrentProcessId ProcessIdToSessionId CreateToolhelp32Snapshot 32671->32689 32674 6e5a3c78 32704 6e5ad126 32674->32704 32675 6e5a3c5e GetCurrentProcess OpenProcessToken 32675->32674 32676 6e5a3c93 CloseHandle 32675->32676 32716 6e5c12cf 32676->32716 32680 6e5a3c83 Mailbox 32680->32676 32719 6e5c0ac0 32689->32719 32692 6e5ad080 ProcessIdToSessionId 32694 6e5ad0be Process32Next 32692->32694 32701 6e5ad0a7 32692->32701 32694->32701 32695 6e5ad115 32700 6e5bd596 __ehhandler$___std_fs_change_permissions@12 6 API calls 32695->32700 32696 6e5ad0e5 OpenProcess 32698 6e5ad0f8 OpenProcessToken 32696->32698 32699 6e5ad112 CloseHandle 32696->32699 32698->32699 32699->32695 32702 6e5a3c5a 32700->32702 32701->32692 32701->32694 32703 6e5ad0d0 CloseHandle 32701->32703 32721 6e5beb87 64 API calls 2 library calls 32701->32721 32702->32674 32702->32675 32703->32695 32703->32696 32722 6e5c12ed 32704->32722 32706 6e5ad132 GetTokenInformation 32707 6e5ad16a numpunct 32706->32707 32708 6e5ad1c2 CloseHandle 32706->32708 32710 6e5ad179 GetTokenInformation 32707->32710 32712 6e5ad1bb 32707->32712 32709 6e5ad1d0 codecvt 32708->32709 32709->32680 32711 6e5ad18e ConvertSidToStringSidA 32710->32711 32710->32712 32713 6e5ad1a6 numpunct 32711->32713 32712->32708 32723 6e5a15c8 32713->32723 32715 6e5ad1b2 LocalFree 32715->32712 32717 6e5bd596 __ehhandler$___std_fs_change_permissions@12 6 API calls 32716->32717 32718 6e5c12d9 32717->32718 32718->32718 32720 6e5ad063 Process32First 32719->32720 32720->32701 32721->32701 32722->32706 32724 6e5a15d8 numpunct 32723->32724 32725 6e5a15f8 32724->32725 32726 6e5a15dc 32724->32726 32742 6e5a1565 48 API calls 4 library calls 32725->32742 32730 6e5a135c 32726->32730 32729 6e5a15f6 _memmove 32729->32715 32731 6e5a1371 32730->32731 32732 6e5a13e5 32730->32732 32733 6e5a137e 32731->32733 32734 6e5a1395 32731->32734 32746 6e5b96f3 48 API calls 2 library calls 32732->32746 32743 6e5a12ab 48 API calls Concurrency::details::SchedulerBase::GetPolicy 32733->32743 32745 6e5a1565 48 API calls 4 library calls 32734->32745 32739 6e5a1386 32744 6e5a12da 48 API calls Concurrency::details::SchedulerBase::GetPolicy 32739->32744 32741 6e5a1393 _memmove 32741->32729 32742->32729 32743->32739 32745->32741 32755 403a45 32756 403b98 32755->32756 32757 403a5d 32755->32757 32759 403ba9 GetDlgItem GetDlgItem 32756->32759 32763 403be9 32756->32763 32757->32756 32758 403a69 32757->32758 32760 403a74 SetWindowPos 32758->32760 32761 403a87 32758->32761 32762 403f18 19 API calls 32759->32762 32760->32761 32766 403aa4 32761->32766 32767 403a8c ShowWindow 32761->32767 32768 403bd3 SetClassLongA 32762->32768 32764 403c43 32763->32764 32769 401389 2 API calls 32763->32769 32770 403b93 32764->32770 32826 403f64 32764->32826 32771 403ac6 32766->32771 32772 403aac DestroyWindow 32766->32772 32767->32766 32773 40140b 2 API calls 32768->32773 32777 403c1b 32769->32777 32775 403acb SetWindowLongA 32771->32775 32776 403adc 32771->32776 32774 403ec2 32772->32774 32773->32763 32774->32770 32786 403ed2 ShowWindow 32774->32786 32775->32770 32778 403b85 32776->32778 32779 403ae8 GetDlgItem 32776->32779 32777->32764 32780 403c1f SendMessageA 32777->32780 32843 403f7f 8 API calls 32778->32843 32783 403b18 32779->32783 32784 403afb SendMessageA IsWindowEnabled 32779->32784 32780->32770 32781 40140b 2 API calls 32793 403c55 32781->32793 32782 403ea3 DestroyWindow EndDialog 32782->32774 32788 403b25 32783->32788 32790 403b6c SendMessageA 32783->32790 32791 403b38 32783->32791 32800 403b1d 32783->32800 32784->32770 32784->32783 32786->32770 32787 405b88 18 API calls 32787->32793 32788->32790 32788->32800 32790->32778 32794 403b40 32791->32794 32795 403b55 32791->32795 32792 403b53 32792->32778 32793->32770 32793->32781 32793->32782 32793->32787 32796 403f18 19 API calls 32793->32796 32816 403de3 DestroyWindow 32793->32816 32829 403f18 32793->32829 32839 40140b 32794->32839 32797 40140b 2 API calls 32795->32797 32796->32793 32799 403b5c 32797->32799 32799->32778 32799->32800 32842 403ef1 SendMessageA 32800->32842 32802 403cd0 GetDlgItem 32803 403ce5 32802->32803 32804 403ced ShowWindow KiUserCallbackDispatcher 32802->32804 32803->32804 32832 403f3a EnableWindow 32804->32832 32806 403d17 EnableWindow 32809 403d2b 32806->32809 32807 403d30 GetSystemMenu EnableMenuItem SendMessageA 32808 403d60 SendMessageA 32807->32808 32807->32809 32808->32809 32809->32807 32833 403f4d SendMessageA 32809->32833 32834 405b66 lstrcpynA 32809->32834 32812 403d8e lstrlenA 32813 405b88 18 API calls 32812->32813 32814 403d9f SetWindowTextA 32813->32814 32835 401389 32814->32835 32816->32774 32817 403dfd CreateDialogParamA 32816->32817 32817->32774 32818 403e30 32817->32818 32819 403f18 19 API calls 32818->32819 32820 403e3b GetDlgItem GetWindowRect ScreenToClient SetWindowPos 32819->32820 32821 401389 2 API calls 32820->32821 32822 403e81 32821->32822 32822->32770 32823 403e89 ShowWindow 32822->32823 32824 403f64 SendMessageA 32823->32824 32825 403ea1 32824->32825 32825->32774 32827 403f7c 32826->32827 32828 403f6d SendMessageA 32826->32828 32827->32793 32828->32827 32830 405b88 18 API calls 32829->32830 32831 403f23 SetDlgItemTextA 32830->32831 32831->32802 32832->32806 32833->32809 32834->32812 32837 401390 32835->32837 32836 4013fe 32836->32793 32837->32836 32838 4013cb MulDiv SendMessageA 32837->32838 32838->32837 32840 401389 2 API calls 32839->32840 32841 401420 32840->32841 32841->32800 32842->32792 32843->32770 32844 402866 SendMessageA 32845 402880 InvalidateRect 32844->32845 32846 40288b 32844->32846 32845->32846 32847 401b06 32848 401b57 32847->32848 32850 401b13 32847->32850 32851 401b80 GlobalAlloc 32848->32851 32852 401b5b 32848->32852 32849 401b9b 32854 405b88 18 API calls 32849->32854 32862 40220e 32849->32862 32850->32849 32856 401b2a 32850->32856 32853 405b88 18 API calls 32851->32853 32852->32862 32868 405b66 lstrcpynA 32852->32868 32853->32849 32857 402208 32854->32857 32866 405b66 lstrcpynA 32856->32866 32869 405427 MessageBoxIndirectA 32857->32869 32858 401b6d GlobalFree 32858->32862 32861 401b39 32867 405b66 lstrcpynA 32861->32867 32864 401b48 32870 405b66 lstrcpynA 32864->32870 32866->32861 32867->32864 32868->32858 32869->32862 32870->32862 32871 6e5b1ff1 32872 6e5b2001 __ftelli64_nolock 32871->32872 32887 6e5bf888 32872->32887 32884 6e5b2099 Mailbox 32885 6e5bd596 __ehhandler$___std_fs_change_permissions@12 6 API calls 32884->32885 32886 6e5b20ba 32885->32886 32888 6e5bf8a1 32887->32888 32889 6e5bf893 32887->32889 32927 6e5c47d7 47 API calls __getptd_noexit 32888->32927 32889->32888 32892 6e5bf8b7 32889->32892 32894 6e5b2056 32892->32894 32929 6e5c47d7 47 API calls __getptd_noexit 32892->32929 32896 6e5a49a7 32894->32896 32895 6e5bf8a8 32928 6e5c595c 8 API calls ___strgtold12_l 32895->32928 32897 6e5a49e8 32896->32897 32898 6e5a49b3 32896->32898 32901 6e5a165e 32897->32901 32898->32897 32899 6e5a49d9 GlobalFree 32898->32899 32900 6e5a49bd lstrcpynA 32898->32900 32899->32897 32900->32899 32902 6e5a167a numpunct 32901->32902 32903 6e5a15c8 numpunct 48 API calls 32902->32903 32904 6e5a1686 32903->32904 32905 6e5a4ac0 32904->32905 32906 6e5a49a7 2 API calls 32905->32906 32907 6e5a4ae3 32906->32907 32908 6e5bd596 __ehhandler$___std_fs_change_permissions@12 6 API calls 32907->32908 32909 6e5a4b00 32908->32909 32910 6e5ada34 32909->32910 32911 6e5ada43 __EH_prolog3_GS 32910->32911 32912 6e5adaef 32911->32912 32913 6e5ada73 32911->32913 32978 6e5ad571 32912->32978 32914 6e5adab5 32913->32914 32917 6e5ada76 32913->32917 32916 6e5a165e numpunct 48 API calls 32914->32916 32920 6e5adac2 32916->32920 32918 6e5ada9f Mailbox 32917->32918 32921 6e5a165e numpunct 48 API calls 32917->32921 32919 6e5c12cf ___DllMainCRTStartup 6 API calls 32918->32919 32922 6e5adb10 32919->32922 32923 6e5ad79c 76 API calls 32920->32923 32924 6e5ada8a 32921->32924 32926 6e5a49ee GlobalAlloc lstrcpynA 32922->32926 32923->32918 32930 6e5ad79c 32924->32930 32926->32884 32927->32895 32928->32894 32929->32895 32931 6e5ad7ab __EH_prolog3_GS 32930->32931 32932 6e5ad9fa Mailbox 32931->32932 33006 6e5a219d 32931->33006 32934 6e5c12cf ___DllMainCRTStartup 6 API calls 32932->32934 32936 6e5ada0c 32934->32936 32935 6e5ad800 RegOpenKeyExA 32935->32932 32938 6e5ad839 _memset 32935->32938 32936->32918 32937 6e5ad86b RegQueryValueExA 32939 6e5ad9ee RegCloseKey 32937->32939 32940 6e5ad896 32937->32940 32938->32937 32939->32932 32941 6e5ada2e 32940->32941 32942 6e5ad8a7 32940->32942 33020 6e5be9ec 32941->33020 32943 6e5ada0d numpunct 32942->32943 32944 6e5ad8c2 32942->32944 32948 6e5a15c8 numpunct 48 API calls 32943->32948 32946 6e5a165e numpunct 48 API calls 32944->32946 32947 6e5ad8cd 32946->32947 33012 6e5b6bec 32947->33012 32977 6e5ad9b9 Mailbox 32948->32977 32950 6e5ada33 __EH_prolog3_GS 32952 6e5adaef 32950->32952 32953 6e5ada73 32950->32953 32951 6e5ad8e2 Mailbox 32958 6e5a165e numpunct 48 API calls 32951->32958 32956 6e5ad571 56 API calls 32952->32956 32954 6e5ada76 32953->32954 32955 6e5adab5 32953->32955 32961 6e5a165e numpunct 48 API calls 32954->32961 32969 6e5ada9f Mailbox 32954->32969 32957 6e5a165e numpunct 48 API calls 32955->32957 32956->32969 32960 6e5adac2 32957->32960 32962 6e5ad901 32958->32962 32959 6e5c12cf ___DllMainCRTStartup 6 API calls 32963 6e5adb10 32959->32963 32964 6e5ad79c 73 API calls 32960->32964 32965 6e5ada8a 32961->32965 33017 6e5a56be 32962->33017 32963->32918 32964->32969 32967 6e5ad79c 73 API calls 32965->32967 32967->32969 32968 6e5ad91e Mailbox numpunct 32970 6e5a15c8 numpunct 48 API calls 32968->32970 32968->32977 32969->32959 32971 6e5ad96f 32970->32971 32972 6e5ad571 56 API calls 32971->32972 32973 6e5ad980 32972->32973 32974 6e5a56be 48 API calls 32973->32974 32973->32977 32975 6e5ad9a3 32974->32975 33023 6e5adb2a 48 API calls 32975->33023 32977->32939 32979 6e5ad580 __EH_prolog3_GS 32978->32979 32980 6e5ad5b9 RegOpenKeyExA 32979->32980 32981 6e5ad5ee _memset 32980->32981 32982 6e5ad6bc Mailbox 32980->32982 32983 6e5ad607 RegQueryValueExA 32981->32983 32984 6e5c12cf ___DllMainCRTStartup 6 API calls 32982->32984 32985 6e5ad6b0 RegCloseKey 32983->32985 32986 6e5ad641 32983->32986 32989 6e5ad6ce 32984->32989 32985->32982 32987 6e5ad6ef 32986->32987 32988 6e5ad650 _memset 32986->32988 32990 6e5be9ec __wsetlocale_nolock 6 API calls 32987->32990 32991 6e5ad678 ExpandEnvironmentStringsA 32988->32991 32992 6e5ad694 numpunct 32988->32992 32989->32918 32993 6e5ad6f4 __EH_prolog3_GS 32990->32993 32991->32985 32991->32992 32994 6e5a15c8 numpunct 48 API calls 32992->32994 32995 6e5ad711 RegOpenKeyExA 32993->32995 32994->32985 32996 6e5ad72b RegCloseKey 32995->32996 32997 6e5ad739 32995->32997 33001 6e5ad78c Mailbox 32996->33001 32998 6e5ad571 49 API calls 32997->32998 33002 6e5ad743 32998->33002 32999 6e5c12cf ___DllMainCRTStartup 6 API calls 33000 6e5ad79b 32999->33000 33000->32918 33001->32999 33002->33001 33003 6e5a219d 48 API calls 33002->33003 33004 6e5ad75c RegLoadKeyA 33003->33004 33004->33001 33007 6e5a21a9 __EH_prolog3 numpunct 33006->33007 33024 6e5a1971 33007->33024 33009 6e5a21df numpunct 33028 6e5a1792 33009->33028 33011 6e5a21fe codecvt 33011->32935 33052 6e5a176c 33012->33052 33014 6e5b6c04 33016 6e5b6c4a 33014->33016 33055 6e5bffdf 64 API calls __toupper_l 33014->33055 33016->32951 33018 6e5a135c Concurrency::details::SchedulerBase::GetPolicy 48 API calls 33017->33018 33019 6e5a56e5 33018->33019 33019->32968 33056 6e5be9f8 IsProcessorFeaturePresent 33020->33056 33023->32977 33025 6e5a198f 33024->33025 33026 6e5a1982 33024->33026 33025->33009 33026->33025 33049 6e5a1565 48 API calls 4 library calls 33026->33049 33029 6e5a17a2 numpunct 33028->33029 33030 6e5a1829 33029->33030 33031 6e5a17d2 33029->33031 33040 6e5a17a6 _memmove 33029->33040 33051 6e5b96c5 48 API calls 2 library calls 33030->33051 33031->33040 33050 6e5a1565 48 API calls 4 library calls 33031->33050 33040->33011 33049->33025 33050->33040 33053 6e5a135c Concurrency::details::SchedulerBase::GetPolicy 48 API calls 33052->33053 33054 6e5a178b 33053->33054 33054->33014 33055->33014 33057 6e5bea0c 33056->33057 33058 6e5be8b6 ___raise_securityfailure 5 API calls 33057->33058 33059 6e5be9f6 33058->33059 33059->32950 33060 6d91855 GetProcessHeap HeapAlloc 33061 6d9188b 33060->33061 33062 6d9189a 33060->33062 33108 6d91e27 GlobalAlloc lstrcpynA 33061->33108 33064 6d91dd9 2 API calls 33062->33064 33070 6d918a2 33064->33070 33065 6d91895 33066 6d91b1e 33065->33066 33067 6d918d7 33109 6d91e27 GlobalAlloc lstrcpynA 33067->33109 33069 6d918e1 GetProcessHeap 33071 6d91b17 HeapFree 33069->33071 33070->33067 33091 6d91252 GetClientRect 33070->33091 33071->33066 33073 6d918cb 33074 6d91dd9 2 API calls 33073->33074 33075 6d918d3 33074->33075 33075->33067 33076 6d918eb GetProcessHeap HeapReAlloc lstrcmpiA 33075->33076 33077 6d91946 lstrcmpiA 33076->33077 33079 6d9192b 33076->33079 33078 6d9196d lstrcmpiA 33077->33078 33077->33079 33078->33079 33080 6d91994 lstrcmpiA 33078->33080 33081 6d91a66 lstrcmpiA 33079->33081 33080->33079 33082 6d919bb lstrcmpiA 33080->33082 33083 6d91a72 33081->33083 33084 6d91a77 CreateWindowExA SetPropA SendMessageA SendMessageA 33081->33084 33082->33079 33085 6d919df lstrcmpiA 33082->33085 33083->33084 33086 6d91aeb SetWindowLongA 33084->33086 33087 6d91b06 GetProcessHeap 33084->33087 33085->33079 33088 6d91a03 lstrcmpiA 33085->33088 33086->33087 33087->33071 33088->33079 33089 6d91a27 lstrcmpiA 33088->33089 33089->33079 33092 6d91dd9 2 API calls 33091->33092 33093 6d91289 33092->33093 33094 6d912fa 33093->33094 33110 6d91329 lstrlenA CharPrevA MulDiv MapDialogRect 33093->33110 33094->33073 33096 6d9129b 33097 6d91dd9 2 API calls 33096->33097 33098 6d912ad 33097->33098 33098->33094 33111 6d91329 lstrlenA CharPrevA MulDiv MapDialogRect 33098->33111 33100 6d912c0 33101 6d91dd9 2 API calls 33100->33101 33102 6d912d2 33101->33102 33102->33094 33112 6d91329 lstrlenA CharPrevA MulDiv MapDialogRect 33102->33112 33104 6d912e4 33105 6d91dd9 2 API calls 33104->33105 33106 6d912f6 33105->33106 33106->33094 33113 6d91329 lstrlenA CharPrevA MulDiv MapDialogRect 33106->33113 33108->33065 33109->33069 33110->33096 33111->33100 33112->33104 33113->33094 33114 40190d 33115 40190f 33114->33115 33116 4029f6 18 API calls 33115->33116 33117 401914 33116->33117 33120 40548b 33117->33120 33161 40573a 33120->33161 33123 4054a8 DeleteFileA 33125 40191d 33123->33125 33124 4054bf 33126 4055fe 33124->33126 33175 405b66 lstrcpynA 33124->33175 33126->33125 33196 405e61 FindFirstFileA 33126->33196 33128 4054e9 33129 4054fa 33128->33129 33130 4054ed lstrcatA 33128->33130 33176 4056a0 lstrlenA 33129->33176 33134 405500 33130->33134 33135 40550e lstrcatA 33134->33135 33136 405519 lstrlenA FindFirstFileA 33134->33136 33135->33136 33138 4055f4 33136->33138 33159 40553d 33136->33159 33138->33126 33140 405684 CharNextA 33140->33159 33141 40581e 2 API calls 33142 405629 RemoveDirectoryA 33141->33142 33143 405634 33142->33143 33144 40564b 33142->33144 33143->33125 33148 40563a 33143->33148 33145 404f04 25 API calls 33144->33145 33145->33125 33146 4055d3 FindNextFileA 33149 4055eb FindClose 33146->33149 33146->33159 33150 404f04 25 API calls 33148->33150 33149->33138 33151 405642 33150->33151 33202 4058b4 38 API calls 33151->33202 33155 40548b 59 API calls 33155->33159 33156 405649 33156->33125 33157 404f04 25 API calls 33157->33146 33159->33140 33159->33146 33159->33155 33159->33157 33180 405b66 lstrcpynA 33159->33180 33181 40581e GetFileAttributesA 33159->33181 33184 404f04 33159->33184 33195 4058b4 38 API calls 33159->33195 33203 405b66 lstrcpynA 33161->33203 33163 40574b 33204 4056ed CharNextA CharNextA 33163->33204 33166 40549f 33166->33123 33166->33124 33167 405dc8 5 API calls 33173 405761 33167->33173 33168 40578c lstrlenA 33169 405797 33168->33169 33168->33173 33171 405659 3 API calls 33169->33171 33170 405e61 2 API calls 33170->33173 33172 40579c GetFileAttributesA 33171->33172 33172->33166 33173->33166 33173->33168 33173->33170 33174 4056a0 2 API calls 33173->33174 33174->33168 33175->33128 33177 4056ad 33176->33177 33178 4056b2 CharPrevA 33177->33178 33179 4056be 33177->33179 33178->33177 33178->33179 33179->33134 33180->33159 33182 4055a0 DeleteFileA 33181->33182 33183 40582d SetFileAttributesA 33181->33183 33182->33159 33183->33182 33185 404fc2 33184->33185 33186 404f1f 33184->33186 33185->33159 33187 404f3c lstrlenA 33186->33187 33188 405b88 18 API calls 33186->33188 33189 404f65 33187->33189 33190 404f4a lstrlenA 33187->33190 33188->33187 33192 404f78 33189->33192 33193 404f6b SetWindowTextA 33189->33193 33190->33185 33191 404f5c lstrcatA 33190->33191 33191->33189 33192->33185 33194 404f7e SendMessageA SendMessageA SendMessageA 33192->33194 33193->33192 33194->33185 33195->33159 33197 405619 33196->33197 33198 405e77 FindClose 33196->33198 33197->33125 33199 405659 lstrlenA CharPrevA 33197->33199 33198->33197 33200 405673 lstrcatA 33199->33200 33201 405623 33199->33201 33200->33201 33201->33141 33202->33156 33203->33163 33205 405707 33204->33205 33207 405713 33204->33207 33206 40570e CharNextA 33205->33206 33205->33207 33209 405730 33206->33209 33208 405684 CharNextA 33207->33208 33207->33209 33208->33207 33209->33166 33209->33167 33210 401bad 33232 4029d9 33210->33232 33212 401bb4 33213 4029d9 18 API calls 33212->33213 33214 401bbe 33213->33214 33215 401bce 33214->33215 33216 4029f6 18 API calls 33214->33216 33217 401bde 33215->33217 33220 4029f6 18 API calls 33215->33220 33216->33215 33218 401be9 33217->33218 33219 401c2d 33217->33219 33221 4029d9 18 API calls 33218->33221 33222 4029f6 18 API calls 33219->33222 33220->33217 33223 401bee 33221->33223 33224 401c32 33222->33224 33225 4029d9 18 API calls 33223->33225 33226 4029f6 18 API calls 33224->33226 33227 401bf7 33225->33227 33228 401c3b FindWindowExA 33226->33228 33229 401c1d SendMessageA 33227->33229 33230 401bff SendMessageTimeoutA 33227->33230 33231 401c59 33228->33231 33229->33231 33230->33231 33233 405b88 18 API calls 33232->33233 33234 4029ed 33233->33234 33234->33212 33235 401f51 33236 401f63 33235->33236 33237 402012 33235->33237 33238 4029f6 18 API calls 33236->33238 33256 401423 25 API calls 33237->33256 33239 401f6a 33238->33239 33241 4029f6 18 API calls 33239->33241 33242 401f73 33241->33242 33243 401f88 LoadLibraryExA 33242->33243 33244 401f7b GetModuleHandleA 33242->33244 33243->33237 33245 401f98 GetProcAddress 33243->33245 33244->33243 33244->33245 33247 401fe5 33245->33247 33248 401fa8 33245->33248 33246 402169 33251 404f04 25 API calls 33247->33251 33249 401fb0 33248->33249 33250 401fc7 KiUserCallbackDispatcher 33248->33250 33255 401423 25 API calls 33249->33255 33252 401fb8 33250->33252 33251->33252 33252->33246 33254 402006 FreeLibrary 33252->33254 33254->33246 33255->33252 33256->33246 33257 4015b3 33258 4029f6 18 API calls 33257->33258 33259 4015ba 33258->33259 33260 4056ed 4 API calls 33259->33260 33267 4015c2 33260->33267 33261 40160a 33263 40162d 33261->33263 33264 40160f 33261->33264 33262 405684 CharNextA 33265 4015d0 CreateDirectoryA 33262->33265 33277 401423 25 API calls 33263->33277 33275 401423 25 API calls 33264->33275 33265->33267 33268 4015e5 GetLastError 33265->33268 33267->33261 33267->33262 33268->33267 33271 4015f2 GetFileAttributesA 33268->33271 33270 401616 33276 405b66 lstrcpynA 33270->33276 33271->33267 33273 401621 SetCurrentDirectoryA 33274 402169 33273->33274 33275->33270 33276->33273 33277->33274 33278 401734 33279 4029f6 18 API calls 33278->33279 33280 40173b 33279->33280 33281 401761 33280->33281 33282 401759 33280->33282 33333 405b66 lstrcpynA 33281->33333 33332 405b66 lstrcpynA 33282->33332 33285 40175f 33289 405dc8 5 API calls 33285->33289 33286 40176c 33287 405659 3 API calls 33286->33287 33288 401772 lstrcatA 33287->33288 33288->33285 33296 40177e 33289->33296 33290 405e61 2 API calls 33290->33296 33291 40581e 2 API calls 33291->33296 33293 401795 CompareFileTime 33293->33296 33294 401859 33295 404f04 25 API calls 33294->33295 33297 401863 33295->33297 33296->33290 33296->33291 33296->33293 33296->33294 33299 405b66 lstrcpynA 33296->33299 33303 405b88 18 API calls 33296->33303 33314 401830 33296->33314 33316 40583d GetFileAttributesA CreateFileA 33296->33316 33334 405427 MessageBoxIndirectA 33296->33334 33317 402f18 33297->33317 33298 404f04 25 API calls 33315 401845 33298->33315 33299->33296 33302 40188a SetFileTime 33304 40189c CloseHandle 33302->33304 33303->33296 33305 4018ad 33304->33305 33304->33315 33306 4018b2 33305->33306 33307 4018c5 33305->33307 33308 405b88 18 API calls 33306->33308 33309 405b88 18 API calls 33307->33309 33311 4018ba lstrcatA 33308->33311 33312 4018cd 33309->33312 33311->33312 33335 405427 MessageBoxIndirectA 33312->33335 33314->33298 33314->33315 33316->33296 33318 402f45 33317->33318 33319 402f29 SetFilePointer 33317->33319 33336 403043 GetTickCount 33318->33336 33319->33318 33322 402f56 ReadFile 33323 402f76 33322->33323 33330 401876 33322->33330 33324 403043 43 API calls 33323->33324 33323->33330 33325 402f8d 33324->33325 33326 403008 ReadFile 33325->33326 33325->33330 33331 402f9d 33325->33331 33326->33330 33328 402fb8 ReadFile 33328->33330 33328->33331 33329 402fd1 WriteFile 33329->33330 33329->33331 33330->33302 33330->33304 33331->33328 33331->33329 33331->33330 33332->33285 33333->33286 33334->33296 33335->33315 33337 403072 33336->33337 33338 4031ad 33336->33338 33349 4031f1 SetFilePointer 33337->33349 33339 402bd3 33 API calls 33338->33339 33345 402f4e 33339->33345 33341 40307d SetFilePointer 33347 4030a2 33341->33347 33345->33322 33345->33330 33346 403137 WriteFile 33346->33345 33346->33347 33347->33345 33347->33346 33348 40318e SetFilePointer 33347->33348 33350 4031bf ReadFile 33347->33350 33352 405f82 33347->33352 33359 402bd3 33347->33359 33348->33338 33349->33341 33351 4031e0 33350->33351 33351->33347 33353 405fa7 33352->33353 33354 405faf 33352->33354 33353->33347 33354->33353 33355 406036 GlobalFree 33354->33355 33356 40603f GlobalAlloc 33354->33356 33357 4060b6 GlobalAlloc 33354->33357 33358 4060ad GlobalFree 33354->33358 33355->33356 33356->33353 33356->33354 33357->33353 33357->33354 33358->33357 33360 402be1 33359->33360 33361 402bf9 33359->33361 33362 402bea DestroyWindow 33360->33362 33367 402bf1 33360->33367 33363 402c01 33361->33363 33364 402c09 GetTickCount 33361->33364 33362->33367 33374 405ec1 DispatchMessageA PeekMessageA 33363->33374 33366 402c17 33364->33366 33364->33367 33368 402c4c CreateDialogParamA ShowWindow 33366->33368 33369 402c1f 33366->33369 33367->33347 33368->33367 33369->33367 33375 402bb7 MulDiv 33369->33375 33371 402c2d wsprintfA 33372 404f04 25 API calls 33371->33372 33373 402c4a 33372->33373 33373->33367 33374->33367 33375->33371 33376 401d95 33377 4029d9 18 API calls 33376->33377 33378 401d9b 33377->33378 33379 4029d9 18 API calls 33378->33379 33380 401da4 33379->33380 33381 401db6 EnableWindow 33380->33381 33382 401dab ShowWindow 33380->33382 33383 40288b 33381->33383 33382->33383 33384 6e5c0365 33385 6e5c036e 33384->33385 33386 6e5c0373 33384->33386 33402 6e5cd261 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 33385->33402 33390 6e5c0388 33386->33390 33389 6e5c0381 33391 6e5c0394 ___DestructExceptionObject 33390->33391 33396 6e5c03e2 33391->33396 33401 6e5c043f ___DestructExceptionObject 33391->33401 33417 6e5c01f3 100 API calls 12 library calls 33391->33417 33393 6e5c03fa 33395 6e5c041c 33393->33395 33397 6e5b3124 ___DllMainCRTStartup 133 API calls 33393->33397 33395->33401 33419 6e5c01f3 100 API calls 12 library calls 33395->33419 33396->33401 33403 6e5b3124 33396->33403 33399 6e5c0412 33397->33399 33418 6e5c01f3 100 API calls 12 library calls 33399->33418 33401->33389 33402->33386 33404 6e5b317a 33403->33404 33405 6e5b3134 33403->33405 33408 6e5b3178 std::ios_base::_Ios_base_dtor 33404->33408 33434 6e5b159c 84 API calls Mailbox 33404->33434 33405->33408 33420 6e5bd5aa 33405->33420 33408->33393 33410 6e5b3150 33427 6e5b5eb6 GetCurrentProcess OpenProcessToken 33410->33427 33414 6e5b5eb6 ___DllMainCRTStartup 11 API calls 33415 6e5b316e 33414->33415 33416 6e5b5eb6 ___DllMainCRTStartup 11 API calls 33415->33416 33416->33408 33417->33396 33418->33395 33419->33401 33423 6e5bd5b2 _malloc 33420->33423 33422 6e5b3141 33422->33410 33433 6e5b14f5 102 API calls 3 library calls 33422->33433 33423->33422 33424 6e5bd5ce std::exception::exception 33423->33424 33435 6e5bdfe7 33423->33435 33450 6e5c0a65 RaiseException 33424->33450 33426 6e5bd5f8 33428 6e5b5f29 CloseHandle 33427->33428 33429 6e5b5ee6 LookupPrivilegeValueA 33427->33429 33431 6e5bd596 __ehhandler$___std_fs_change_permissions@12 6 API calls 33428->33431 33429->33428 33430 6e5b5ef6 AdjustTokenPrivileges 33429->33430 33430->33428 33432 6e5b3164 33431->33432 33432->33414 33433->33410 33434->33408 33436 6e5bdff3 33435->33436 33437 6e5be062 _malloc 33435->33437 33444 6e5bdffe _malloc 33436->33444 33456 6e5c47d7 47 API calls __getptd_noexit 33437->33456 33440 6e5be026 HeapAlloc 33440->33444 33449 6e5be05a 33440->33449 33441 6e5be06e 33441->33423 33443 6e5be04e 33454 6e5c47d7 47 API calls __getptd_noexit 33443->33454 33444->33436 33444->33440 33444->33443 33447 6e5be04c 33444->33447 33451 6e5c5eb9 47 API calls __NMSG_WRITE 33444->33451 33452 6e5c5f16 47 API calls 8 library calls 33444->33452 33453 6e5c5a79 GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 33444->33453 33455 6e5c47d7 47 API calls __getptd_noexit 33447->33455 33449->33441 33450->33426 33451->33444 33452->33444 33454->33447 33455->33449 33456->33441 33457 40323c #17 SetErrorMode OleInitialize 33527 405e88 GetModuleHandleA 33457->33527 33461 4032aa GetCommandLineA 33532 405b66 lstrcpynA 33461->33532 33463 4032bc GetModuleHandleA 33464 4032d3 33463->33464 33465 405684 CharNextA 33464->33465 33466 4032e7 CharNextA 33465->33466 33471 4032f4 33466->33471 33467 40335d 33468 403370 GetTempPathA 33467->33468 33533 403208 33468->33533 33470 403386 33472 4033aa DeleteFileA 33470->33472 33473 40338a GetWindowsDirectoryA lstrcatA 33470->33473 33471->33467 33474 405684 CharNextA 33471->33474 33478 40335f 33471->33478 33541 402c72 GetTickCount GetModuleFileNameA 33472->33541 33475 403208 11 API calls 33473->33475 33474->33471 33477 4033a6 33475->33477 33477->33472 33522 403424 33477->33522 33625 405b66 lstrcpynA 33478->33625 33479 4033bb 33484 405684 CharNextA 33479->33484 33514 403414 33479->33514 33479->33522 33482 40342d OleUninitialize 33485 403522 33482->33485 33486 40343d 33482->33486 33487 4033d2 33484->33487 33489 4035a5 ExitProcess 33485->33489 33492 405e88 3 API calls 33485->33492 33629 405427 MessageBoxIndirectA 33486->33629 33493 403453 lstrcatA lstrcmpiA 33487->33493 33494 4033ef 33487->33494 33491 40344b ExitProcess 33495 403531 33492->33495 33498 40346f CreateDirectoryA SetCurrentDirectoryA 33493->33498 33493->33522 33497 40573a 18 API calls 33494->33497 33496 405e88 3 API calls 33495->33496 33499 40353a 33496->33499 33500 4033fa 33497->33500 33501 403491 33498->33501 33502 403486 33498->33502 33503 405e88 3 API calls 33499->33503 33500->33522 33626 405b66 lstrcpynA 33500->33626 33631 405b66 lstrcpynA 33501->33631 33630 405b66 lstrcpynA 33502->33630 33506 403543 33503->33506 33508 403591 ExitWindowsEx 33506->33508 33513 403551 GetCurrentProcess 33506->33513 33508->33489 33512 40359e 33508->33512 33509 403409 33627 405b66 lstrcpynA 33509->33627 33511 405b88 18 API calls 33515 4034c1 DeleteFileA 33511->33515 33516 40140b 2 API calls 33512->33516 33518 403561 33513->33518 33571 4036af 33514->33571 33517 4034ce CopyFileA 33515->33517 33524 40349f 33515->33524 33516->33489 33517->33524 33518->33508 33519 403516 33634 4058b4 38 API calls 33519->33634 33628 4035bd 72 API calls 33522->33628 33523 405b88 18 API calls 33523->33524 33524->33511 33524->33519 33524->33523 33526 403502 CloseHandle 33524->33526 33632 4058b4 38 API calls 33524->33632 33633 4053c6 CreateProcessA CloseHandle 33524->33633 33526->33524 33528 405ea4 LoadLibraryA 33527->33528 33529 405eaf GetProcAddress 33527->33529 33528->33529 33530 40327f SHGetFileInfoA 33528->33530 33529->33530 33531 405b66 lstrcpynA 33530->33531 33531->33461 33532->33463 33534 405dc8 5 API calls 33533->33534 33535 403214 33534->33535 33536 40321e 33535->33536 33537 405659 3 API calls 33535->33537 33536->33470 33538 403226 CreateDirectoryA 33537->33538 33539 40586c 2 API calls 33538->33539 33540 40323a 33539->33540 33540->33470 33635 40583d GetFileAttributesA CreateFileA 33541->33635 33543 402cb5 33570 402cc2 33543->33570 33636 405b66 lstrcpynA 33543->33636 33545 402cd8 33546 4056a0 2 API calls 33545->33546 33547 402cde 33546->33547 33637 405b66 lstrcpynA 33547->33637 33549 402ce9 GetFileSize 33550 402dea 33549->33550 33568 402d00 33549->33568 33551 402bd3 33 API calls 33550->33551 33552 402df1 33551->33552 33554 402e2d GlobalAlloc 33552->33554 33552->33570 33638 4031f1 SetFilePointer 33552->33638 33553 4031bf ReadFile 33553->33568 33558 402e44 33554->33558 33555 402e85 33556 402bd3 33 API calls 33555->33556 33556->33570 33562 40586c 2 API calls 33558->33562 33559 402e0e 33560 4031bf ReadFile 33559->33560 33563 402e19 33560->33563 33561 402bd3 33 API calls 33561->33568 33564 402e55 CreateFileA 33562->33564 33563->33554 33563->33570 33565 402e8f 33564->33565 33564->33570 33639 4031f1 SetFilePointer 33565->33639 33567 402e9d 33569 402f18 48 API calls 33567->33569 33568->33550 33568->33553 33568->33555 33568->33561 33568->33570 33569->33570 33570->33479 33572 405e88 3 API calls 33571->33572 33573 4036c3 33572->33573 33574 4036c9 33573->33574 33575 4036db 33573->33575 33649 405ac4 wsprintfA 33574->33649 33576 405a4d 3 API calls 33575->33576 33577 4036fc 33576->33577 33579 40371a lstrcatA 33577->33579 33581 405a4d 3 API calls 33577->33581 33580 4036d9 33579->33580 33640 403978 33580->33640 33581->33579 33584 40573a 18 API calls 33585 40374c 33584->33585 33586 4037d5 33585->33586 33588 405a4d 3 API calls 33585->33588 33587 40573a 18 API calls 33586->33587 33589 4037db 33587->33589 33590 403778 33588->33590 33591 4037eb LoadImageA 33589->33591 33592 405b88 18 API calls 33589->33592 33590->33586 33595 403794 lstrlenA 33590->33595 33599 405684 CharNextA 33590->33599 33593 403816 RegisterClassA 33591->33593 33594 40389f 33591->33594 33592->33591 33596 403852 SystemParametersInfoA CreateWindowExA 33593->33596 33624 4038a9 33593->33624 33597 40140b 2 API calls 33594->33597 33600 4037a2 lstrcmpiA 33595->33600 33601 4037c8 33595->33601 33596->33594 33598 4038a5 33597->33598 33605 403978 19 API calls 33598->33605 33598->33624 33603 403792 33599->33603 33600->33601 33604 4037b2 GetFileAttributesA 33600->33604 33602 405659 3 API calls 33601->33602 33606 4037ce 33602->33606 33603->33595 33607 4037be 33604->33607 33609 4038b6 33605->33609 33650 405b66 lstrcpynA 33606->33650 33607->33601 33608 4056a0 2 API calls 33607->33608 33608->33601 33611 4038c2 ShowWindow LoadLibraryA 33609->33611 33612 403945 33609->33612 33613 4038e1 LoadLibraryA 33611->33613 33614 4038e8 GetClassInfoA 33611->33614 33651 404fd6 MulDiv SendMessageA SendMessageA OleInitialize OleUninitialize 33612->33651 33613->33614 33617 403912 DialogBoxParamA 33614->33617 33618 4038fc GetClassInfoA RegisterClassA 33614->33618 33616 40394b 33619 403967 33616->33619 33620 40394f 33616->33620 33621 40140b 2 API calls 33617->33621 33618->33617 33622 40140b 2 API calls 33619->33622 33623 40140b 2 API calls 33620->33623 33620->33624 33621->33624 33622->33624 33623->33624 33624->33522 33625->33468 33626->33509 33627->33514 33628->33482 33629->33491 33630->33501 33631->33524 33632->33524 33633->33524 33634->33522 33635->33543 33636->33545 33637->33549 33638->33559 33639->33567 33641 40398c 33640->33641 33652 405ac4 wsprintfA 33641->33652 33643 4039fd 33644 405b88 18 API calls 33643->33644 33645 403a09 SetWindowTextA 33644->33645 33646 40372a 33645->33646 33647 403a25 33645->33647 33646->33584 33647->33646 33648 405b88 18 API calls 33647->33648 33648->33647 33649->33580 33650->33586 33651->33616 33652->33643 33653 1000255e 33654 100026b2 GetCurrentProcessId GetCurrentThreadId 33653->33654 33655 1000258a 33653->33655 33656 100026d1 33654->33656 33657 1000284a 33654->33657 33789 10002e29 GetVersionExA 33655->33789 33658 10002956 33656->33658 33659 100026e6 33656->33659 33660 10002dc2 33657->33660 33661 10002db9 GlobalFree 33657->33661 33664 10001b86 11 API calls 33658->33664 33662 100026ed 33659->33662 33663 1000284f 33659->33663 33661->33660 33666 100026f4 33662->33666 33667 100027ff GetCurrentProcessId GetCurrentThreadId 33662->33667 33819 10002e72 CharNextA CharNextA CharNextA 33663->33819 33669 1000295b 33664->33669 33671 100026fb 33666->33671 33672 100027bd GetCurrentProcessId GetCurrentThreadId 33666->33672 33674 10001b86 11 API calls 33667->33674 33673 10002e29 GetVersionExA 33669->33673 33676 1000275e GetCurrentProcessId GetCurrentThreadId 33671->33676 33677 100026fe 33671->33677 33678 10001b86 11 API calls 33672->33678 33679 10002968 33673->33679 33675 1000280c 33674->33675 33696 10001b86 11 API calls 33675->33696 33815 10001b86 33676->33815 33681 10002701 33677->33681 33682 1000272d 33677->33682 33683 100027ca wsprintfA GetCurrentProcessId 33678->33683 33685 10002e29 GetVersionExA 33679->33685 33681->33657 33689 10002708 33681->33689 33682->33657 33690 1000273a 33682->33690 33683->33657 33684 1000288c 33684->33657 33688 1000289c 33684->33688 33692 10002978 33685->33692 33821 10002357 14 API calls 33688->33821 33799 100019ee SetLastError GetVersionExA 33689->33799 33814 10002357 14 API calls 33690->33814 33691 1000285d 33691->33657 33691->33684 33820 10002e72 CharNextA CharNextA CharNextA 33691->33820 33701 10002986 33692->33701 33702 100029b7 33692->33702 33708 10002825 wsprintfA GetLastError GetCurrentProcessId 33696->33708 33712 10002997 33701->33712 33728 10002d19 33701->33728 33706 100029c0 33702->33706 33707 100029e9 GetCommandLineA 33702->33707 33703 100025df 33703->33654 33715 100025f7 CreateEventA 33703->33715 33705 10002793 33705->33657 33722 100027b0 33705->33722 33828 10002357 14 API calls 33706->33828 33732 10002a0a IsWindowVisible 33707->33732 33713 10001b86 11 API calls 33708->33713 33709 100028a1 33709->33657 33724 100028d7 33709->33724 33822 10001fcf 8 API calls 33709->33822 33710 10002714 wsprintfA 33710->33660 33711 1000273f SendMessageA 33711->33657 33827 10002357 14 API calls 33712->33827 33713->33657 33719 10002658 GetLastError 33715->33719 33720 1000260c CreateEventA 33715->33720 33716 10002d47 wsprintfA wsprintfA wsprintfA wsprintfA 33716->33657 33718 1000299c PostMessageA 33718->33728 33729 10002654 33719->33729 33720->33719 33726 1000261b CreateFileMappingA 33720->33726 33721 10002d35 CloseHandle 33721->33716 33818 10002357 14 API calls 33722->33818 33823 10001fcf 8 API calls 33724->33823 33726->33719 33733 1000263c MapViewOfFile 33726->33733 33728->33716 33728->33721 33764 100029c5 33728->33764 33729->33654 33735 10002665 CreateThread 33729->33735 33741 10002b6a 33732->33741 33742 10002a3b GetModuleHandleA 33732->33742 33733->33719 33733->33729 33734 100027b5 33734->33657 33738 10002682 GetLastError 33735->33738 33739 1000268a WaitForSingleObject 33735->33739 33844 10002218 CoInitialize CreateWindowExA 33735->33844 33736 100028f0 33824 10001f41 8 API calls 33736->33824 33744 100025b8 33738->33744 33739->33744 33745 1000269c GetExitCodeThread 33739->33745 33829 10001bff 33741->33829 33747 10002a6d GetWindowLongA SetWindowLongA SetWindowPos LoadIconA FindWindowExA 33742->33747 33748 10002a4e CreateDialogParamA 33742->33748 33744->33654 33745->33744 33746 10002909 33750 10002918 33746->33750 33825 10001fcf 8 API calls 33746->33825 33752 10002aeb 33747->33752 33748->33741 33748->33747 33826 10001fcf 8 API calls 33750->33826 33755 10002af2 9 API calls 33752->33755 33756 10002ad7 ShowWindow FindWindowExA 33752->33756 33754 10002926 33754->33657 33757 1000292f SetCurrentDirectoryA 33754->33757 33755->33741 33756->33752 33757->33657 33758 10002b72 33758->33728 33759 10002ba5 GlobalAlloc 33758->33759 33760 10002b9c GlobalFree 33758->33760 33761 10002bb2 33759->33761 33762 10002bbb GetModuleFileNameA 33759->33762 33760->33759 33761->33758 33761->33764 33762->33761 33763 10002bdb lstrlenA GlobalAlloc 33762->33763 33763->33764 33765 10002c04 wsprintfA 33763->33765 33764->33721 33764->33728 33766 10002c25 33765->33766 33767 10002c3f SetForegroundWindow 33765->33767 33838 1000197e 6 API calls 33766->33838 33769 10002c6b 33767->33769 33770 10002c4e 33767->33770 33841 10001d52 GetCurrentThreadId SetWindowsHookExA GetVersionExA 33769->33841 33839 10001b94 LoadLibraryA GetProcAddress SHGetValueA 33770->33839 33772 10002c2f 33772->33764 33772->33767 33774 10002c70 ShellExecuteExA 33776 10002c83 GetLastError 33774->33776 33777 10002c7e 33774->33777 33775 10002c53 33775->33769 33778 10002c57 33775->33778 33779 10002c8c UnhookWindowsHookEx 33776->33779 33777->33779 33840 10001928 DialogBoxParamA GetLastError 33778->33840 33781 10002c66 33779->33781 33781->33728 33782 10002c9d GetCurrentProcessId GetCurrentThreadId 33781->33782 33783 10002ca9 MsgWaitForMultipleObjects 33782->33783 33784 10002cc1 33783->33784 33785 10002ccf GetExitCodeProcess 33783->33785 33784->33783 33786 10002cfb GetLastError 33784->33786 33842 10001ecd 6 API calls 33784->33842 33787 10002d04 CloseHandle 33785->33787 33786->33787 33787->33728 33787->33764 33790 100025b3 33789->33790 33790->33744 33791 10001df1 GetCommandLineA 33790->33791 33792 10001bff 3 API calls 33791->33792 33793 10001dfd 33792->33793 33794 10001e06 CharNextA 33793->33794 33795 10001e11 33793->33795 33797 10001e45 33793->33797 33794->33793 33794->33795 33795->33797 33843 10002e72 CharNextA CharNextA CharNextA 33795->33843 33798 10001d8d 7 API calls 33797->33798 33798->33703 33800 10001a4c OpenProcessToken 33799->33800 33802 10001a41 33799->33802 33801 10001a62 33800->33801 33800->33802 33801->33802 33803 10001a98 GetTokenInformation 33801->33803 33804 10001b47 33802->33804 33805 10001b2c GetTokenInformation 33802->33805 33803->33802 33806 10001aaf GetLastError 33803->33806 33807 10001b5b 33804->33807 33808 10001b73 CloseHandle 33804->33808 33805->33804 33806->33802 33809 10001aba GlobalAlloc 33806->33809 33807->33804 33807->33808 33808->33710 33809->33802 33810 10001acb GetTokenInformation 33809->33810 33811 10001b0e GlobalFree 33810->33811 33813 10001ade 33810->33813 33811->33802 33812 10001aea EqualSid 33812->33813 33813->33811 33813->33812 33814->33711 33816 100019ee 11 API calls 33815->33816 33817 10001b8d SetWindowLongA 33816->33817 33817->33705 33818->33734 33819->33691 33820->33684 33821->33709 33822->33724 33823->33736 33824->33746 33825->33750 33826->33754 33827->33718 33828->33764 33830 10001c0b 33829->33830 33832 10001c34 33829->33832 33831 10001c12 33830->33831 33830->33832 33833 10001c26 33831->33833 33834 10001c1d CharNextA 33831->33834 33835 10001c30 33832->33835 33837 10001c40 CharNextA 33832->33837 33833->33835 33836 10001c2b CharNextA 33833->33836 33834->33831 33834->33833 33835->33758 33836->33835 33837->33832 33838->33772 33839->33775 33840->33781 33841->33774 33842->33784 33843->33797 33845 10002263 SetWindowLongA SetEvent 33844->33845 33846 1000233c GetLastError 33844->33846 33847 1000227d MsgWaitForMultipleObjects 33845->33847 33848 10002346 GetCurrentProcessId GetCurrentThreadId 33846->33848 33849 100022c3 GetCurrentProcessId GetCurrentThreadId 33847->33849 33854 1000229f 33847->33854 33849->33854 33850 100022a2 GetLastError 33850->33854 33851 1000231c SetEvent 33851->33854 33853 100022dd SetCurrentDirectoryA 33853->33854 33854->33847 33854->33848 33854->33850 33854->33851 33854->33853 33855 1000233a 33854->33855 33856 10001ecd 6 API calls 33854->33856 33855->33848 33856->33854 33857 6e5b1864 33858 6e5b1874 __ftelli64_nolock 33857->33858 33859 6e5bf888 std::exception::_Copy_str 47 API calls 33858->33859 33860 6e5b18cb 33859->33860 33861 6e5a49a7 2 API calls 33860->33861 33862 6e5b18d9 33861->33862 33863 6e5a165e numpunct 48 API calls 33862->33863 33864 6e5b18e7 33863->33864 33865 6e5bf888 std::exception::_Copy_str 47 API calls 33864->33865 33866 6e5b18f3 33865->33866 33867 6e5a49a7 2 API calls 33866->33867 33868 6e5b1901 33867->33868 33869 6e5a165e numpunct 48 API calls 33868->33869 33870 6e5b190f 33869->33870 33871 6e5bf888 std::exception::_Copy_str 47 API calls 33870->33871 33872 6e5b191b 33871->33872 33873 6e5a49a7 2 API calls 33872->33873 33874 6e5b1929 33873->33874 33875 6e5a165e numpunct 48 API calls 33874->33875 33876 6e5b1937 33875->33876 33883 6e5a53ee 33876->33883 33880 6e5b196a Mailbox 33881 6e5bd596 __ehhandler$___std_fs_change_permissions@12 6 API calls 33880->33881 33882 6e5b199e 33881->33882 33884 6e5a53fd __EH_prolog3_GS 33883->33884 33885 6e5a165e numpunct 48 API calls 33884->33885 33886 6e5a542c 33885->33886 33887 6e5a165e numpunct 48 API calls 33886->33887 33888 6e5a543f 33887->33888 33908 6e5a57e7 33888->33908 33890 6e5a545a RegOpenKeyExA 33892 6e5a5490 33890->33892 33893 6e5a5694 RegCloseKey 33890->33893 33918 6e5a4ba1 33892->33918 33895 6e5a56ab Mailbox 33893->33895 33897 6e5c12cf ___DllMainCRTStartup 6 API calls 33895->33897 33896 6e5a176c Concurrency::details::SchedulerBase::GetPolicy 48 API calls 33906 6e5a54a1 _memset Mailbox 33896->33906 33899 6e5a56bd 33897->33899 33898 6e5a5689 33898->33893 33907 6e5a49ee GlobalAlloc lstrcpynA 33899->33907 33901 6e5a56be 48 API calls 33901->33906 33904 6e5a165e 48 API calls numpunct 33904->33906 33905 6e5a135c 48 API calls Concurrency::details::SchedulerBase::GetPolicy 33905->33906 33906->33896 33906->33898 33906->33901 33906->33904 33906->33905 33928 6e5a5c65 101 API calls 2 library calls 33906->33928 33929 6e5be2a6 47 API calls _vscan_fn 33906->33929 33930 6e5a5af5 78 API calls vswprintf 33906->33930 33907->33880 33909 6e5a57f3 __EH_prolog3 33908->33909 33931 6e5b99d1 33909->33931 33911 6e5a580b 33912 6e5a5820 numpunct 33911->33912 33961 6e5b9721 48 API calls 2 library calls 33911->33961 33943 6e5a5d53 33912->33943 33915 6e5a5833 33949 6e5a5dfa 33915->33949 33917 6e5a583f codecvt 33917->33890 34055 6e5c1320 33918->34055 33920 6e5a4bb0 RegQueryInfoKeyA 33921 6e5a4c6e 33920->33921 33922 6e5a4bf3 Mailbox 33920->33922 33923 6e5c12cf ___DllMainCRTStartup 6 API calls 33921->33923 33922->33921 33924 6e5a4c03 RegEnumKeyExA 33922->33924 33926 6e5a165e numpunct 48 API calls 33922->33926 34056 6e5a45f2 48 API calls 33922->34056 33925 6e5a4c75 33923->33925 33924->33922 33925->33906 33926->33922 33928->33906 33929->33906 33930->33906 33932 6e5b99dd __EH_prolog3 33931->33932 33962 6e5b9775 33932->33962 33936 6e5b9a19 33968 6e5b97d1 33936->33968 33937 6e5b99fb 33976 6e5b9b2a 48 API calls _Atexit 33937->33976 33940 6e5b9a03 33977 6e5b9930 47 API calls 3 library calls 33940->33977 33941 6e5b9a45 codecvt 33941->33911 33944 6e5a5d5f __EH_prolog3 33943->33944 33982 6e5a5eb1 33944->33982 33946 6e5a5d8a 33947 6e5bd5aa codecvt 48 API calls 33946->33947 33948 6e5a5d94 codecvt 33947->33948 33948->33915 33950 6e5a5e06 __EH_prolog3_catch 33949->33950 34007 6e5a6dd2 33950->34007 33952 6e5a5e1b 34010 6e5a6c86 33952->34010 33955 6e5a5e32 34024 6e5a6d6f 33955->34024 33958 6e5a5e3a 34028 6e5a8b4d 33958->34028 33960 6e5a5e43 codecvt 33960->33917 33963 6e5b978d 33962->33963 33964 6e5b9784 33962->33964 33965 6e5b978b 33963->33965 33979 6e5baccd EnterCriticalSection 33963->33979 33978 6e5c2158 47 API calls 2 library calls 33964->33978 33965->33936 33975 6e5b9b0b 48 API calls 2 library calls 33965->33975 33969 6e5b97e0 33968->33969 33970 6e5b97d7 33968->33970 33974 6e5b97f3 33969->33974 33981 6e5bacdb LeaveCriticalSection 33969->33981 33980 6e5c22bc LeaveCriticalSection 33970->33980 33972 6e5b97de 33972->33941 33974->33941 33975->33937 33976->33940 33977->33936 33978->33965 33979->33965 33980->33972 33981->33974 33983 6e5a5ebd __EH_prolog3 33982->33983 33988 6e5a61e7 33983->33988 33985 6e5a5ee4 33991 6e5a605a 33985->33991 33987 6e5a5ef2 codecvt 33987->33946 33996 6e5a6282 33988->33996 33990 6e5a61f5 33990->33985 33992 6e5a606a 33991->33992 33993 6e5a60ad 33991->33993 33992->33987 34006 6e5b96c5 48 API calls 2 library calls 33993->34006 33997 6e5a629e 33996->33997 34003 6e5a629a 33996->34003 33998 6e5a62bf 33997->33998 33999 6e5a62a6 33997->33999 34005 6e5b96c5 48 API calls 2 library calls 33998->34005 34004 6e5a3a18 48 API calls 2 library calls 33999->34004 34003->33990 34004->34003 34008 6e5bd5aa codecvt 48 API calls 34007->34008 34009 6e5a6ddf 34008->34009 34009->33952 34032 6e5a88c4 34010->34032 34013 6e5a6cc1 34046 6e5a8aa7 48 API calls codecvt 34013->34046 34015 6e5a5e24 34015->33955 34031 6e5b9721 48 API calls 2 library calls 34015->34031 34016 6e5a8b4d 48 API calls 34017 6e5a6cb8 34016->34017 34018 6e5a6d6f 48 API calls 34017->34018 34018->34013 34019 6e5a88c4 104 API calls 34023 6e5a6ccc 34019->34023 34020 6e5a8b4d 48 API calls 34020->34023 34021 6e5bd5aa codecvt 48 API calls 34021->34023 34022 6e5a6d6f 48 API calls 34022->34023 34023->34015 34023->34019 34023->34020 34023->34021 34023->34022 34025 6e5a6d80 34024->34025 34026 6e5bd5aa codecvt 48 API calls 34025->34026 34027 6e5a6da3 34026->34027 34027->33958 34029 6e5bd5aa codecvt 48 API calls 34028->34029 34030 6e5a8b5a 34029->34030 34030->33960 34044 6e5a88cd 34032->34044 34033 6e5a6ca0 34033->34013 34033->34015 34033->34016 34034 6e5a89ce 34054 6e5b9721 48 API calls 2 library calls 34034->34054 34035 6e5a8b4d 48 API calls 34035->34044 34044->34033 34044->34034 34044->34035 34047 6e5a9c11 104 API calls codecvt 34044->34047 34048 6e5aaab6 48 API calls codecvt 34044->34048 34049 6e5aaadc 104 API calls 34044->34049 34050 6e5aa88a 104 API calls 34044->34050 34051 6e5a9cf1 104 API calls 34044->34051 34052 6e5a9e65 104 API calls codecvt 34044->34052 34053 6e5a9da1 104 API calls 34044->34053 34046->34023 34047->34044 34048->34044 34049->34044 34050->34044 34051->34044 34052->34044 34053->34044 34055->33920 34056->33922 34057 250198f 34058 25019bf 34057->34058 34100 2501d3b 34058->34100 34060 25019c6 34061 2501adc 34060->34061 34062 25019d7 34060->34062 34063 25019de 34060->34063 34146 25023f6 GlobalAlloc 34062->34146 34127 2502440 34063->34127 34066 25019dd 34066->34063 34068 2501a42 34073 2501a84 34068->34073 34074 2501a48 34068->34074 34069 2501a24 34149 25025fe 15 API calls 34069->34149 34070 2501a0d 34075 2501a12 34070->34075 34088 2501a03 34070->34088 34071 25019f4 34072 25019fa 34071->34072 34078 2501a05 34071->34078 34072->34088 34140 250120c 34072->34140 34154 25025fe 15 API calls 34073->34154 34152 25018a1 GlobalAlloc lstrcpyA wsprintfA 34074->34152 34148 25014c7 GlobalFree 34075->34148 34077 2501a2a 34150 25018a1 GlobalAlloc lstrcpyA wsprintfA 34077->34150 34147 25027cc GlobalAlloc GlobalSize 34078->34147 34085 2501a5e 34153 25025fe 15 API calls 34085->34153 34086 2501a76 34090 2501a8b 34086->34090 34087 2501a30 34151 250159e GlobalAlloc lstrcpynA 34087->34151 34088->34068 34088->34069 34092 2501acb 34090->34092 34155 25025c4 GlobalFree 34090->34155 34092->34061 34095 2501ad5 GlobalFree 34092->34095 34094 2501a36 GlobalFree 34094->34090 34095->34061 34096 2501a97 34097 2501ab7 34096->34097 34098 2501ab0 FreeLibrary 34096->34098 34097->34092 34156 2501825 GlobalAlloc lstrcpynA wsprintfA 34097->34156 34098->34097 34157 2501541 GlobalAlloc 34100->34157 34102 2501d5c 34158 2501541 GlobalAlloc 34102->34158 34104 2501d67 34159 2501561 34104->34159 34106 2501f77 GlobalFree GlobalFree GlobalFree 34107 2501f94 34106->34107 34121 2501fde 34106->34121 34108 25022c0 34107->34108 34116 2501fa9 34107->34116 34107->34121 34110 25022d9 GetModuleHandleA 34108->34110 34108->34121 34109 2501e21 GlobalAlloc 34122 2501d6f 34109->34122 34113 25022ea LoadLibraryA 34110->34113 34114 25022fb GetProcAddress 34110->34114 34111 2501e70 lstrcpyA 34117 2501e7a lstrcpyA 34111->34117 34112 2501e95 GlobalFree 34112->34122 34113->34114 34113->34121 34115 250231a lstrcatA GetProcAddress 34114->34115 34114->34121 34115->34121 34116->34121 34165 2501550 GlobalAlloc lstrcpyA 34116->34165 34117->34122 34120 2502267 lstrcpyA 34120->34122 34121->34060 34122->34106 34122->34109 34122->34111 34122->34112 34122->34117 34122->34120 34123 2501ed7 34122->34123 34124 250212b GlobalFree 34122->34124 34166 2501541 GlobalAlloc 34122->34166 34167 2501550 GlobalAlloc lstrcpyA 34122->34167 34123->34122 34164 250187c GlobalSize GlobalAlloc 34123->34164 34124->34122 34128 2502458 34127->34128 34129 2501561 3 API calls 34128->34129 34131 250258d GlobalFree 34128->34131 34133 2501550 GlobalAlloc lstrcpyA 34128->34133 34134 2502515 GlobalAlloc MultiByteToWideChar 34128->34134 34137 25024f4 lstrlenA 34128->34137 34169 25015e5 GlobalAlloc lstrcpyA 34128->34169 34129->34128 34131->34128 34132 25019e4 34131->34132 34132->34070 34132->34071 34132->34088 34133->34128 34135 2502503 34134->34135 34136 2502542 GlobalAlloc 34134->34136 34135->34131 34170 250276e VirtualAlloc 34135->34170 34138 2502559 GlobalFree 34136->34138 34137->34131 34137->34135 34138->34131 34143 250121e 34140->34143 34141 25012c3 LoadImageA 34142 25012e1 34141->34142 34144 25013d2 GetLastError 34142->34144 34145 25013dd 34142->34145 34143->34141 34144->34145 34145->34088 34146->34066 34147->34088 34149->34077 34150->34087 34151->34094 34152->34085 34153->34086 34154->34086 34155->34096 34156->34092 34157->34102 34158->34104 34160 250159a 34159->34160 34161 250156b 34159->34161 34160->34122 34161->34160 34168 2501541 GlobalAlloc 34161->34168 34163 2501577 lstrcpyA GlobalFree 34163->34122 34164->34123 34165->34121 34166->34122 34167->34122 34168->34163 34169->34128 34170->34135

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 0 1000255e-10002584 1 100026b2-100026cb GetCurrentProcessId GetCurrentThreadId 0->1 2 1000258a-100025b6 call 10002e29 0->2 3 100026d1-100026e0 1->3 4 10002dab-10002db7 1->4 25 100025c4-100025e4 call 10001df1 call 10001d8d 2->25 26 100025b8-100025bf 2->26 5 10002956-10002984 call 10001b86 call 10002e29 * 2 3->5 6 100026e6-100026e7 3->6 8 10002dc2-10002dc5 4->8 9 10002db9-10002dbc GlobalFree 4->9 64 10002986-10002991 5->64 65 100029b7-100029be 5->65 10 100026ed-100026ee 6->10 11 1000284f-10002862 call 10002e72 6->11 14 10002dd3-10002dd7 8->14 15 10002dc7-10002dcc 8->15 9->8 16 100026f4-100026f5 10->16 17 100027ff-10002813 GetCurrentProcessId GetCurrentThreadId call 10001b86 10->17 11->4 32 10002868-10002871 11->32 15->14 21 100026fb-100026fc 16->21 22 100027bd-100027d1 GetCurrentProcessId GetCurrentThreadId call 10001b86 16->22 35 10002815-10002818 17->35 36 1000281a 17->36 29 1000275e-10002777 GetCurrentProcessId GetCurrentThreadId call 10001b86 21->29 30 100026fe-100026ff 21->30 50 100027d3-100027d6 22->50 51 100027d8 22->51 25->1 69 100025ea-100025f1 25->69 26->1 57 10002779 29->57 58 1000277e-10002791 SetWindowLongA 29->58 37 10002701-10002702 30->37 38 1000272d-10002734 30->38 40 10002873-10002876 32->40 41 1000288f-10002896 32->41 45 1000281d-1000284a call 10001b86 wsprintfA GetLastError GetCurrentProcessId call 10001b86 35->45 36->45 37->4 48 10002708-10002728 call 100019ee wsprintfA 37->48 38->4 49 1000273a-10002759 call 10002357 SendMessageA 38->49 52 10002878-1000287d 40->52 53 1000287f-10002881 40->53 46 10002949-10002951 41->46 47 1000289c-100028a6 call 10002357 41->47 79 10002da6-10002da9 45->79 46->4 47->4 90 100028ac-100028cc 47->90 48->14 49->4 63 100027db-100027fa wsprintfA GetCurrentProcessId 50->63 51->63 52->40 52->53 53->41 66 10002883-1000288c call 10002e72 53->66 57->58 70 10002793 58->70 71 1000279a-100027a1 58->71 63->79 80 10002997-100029b2 call 10002357 PostMessageA 64->80 81 10002d1c-10002d23 64->81 72 100029c0-100029ca call 10002357 65->72 73 100029e9-100029ef 65->73 66->41 69->1 85 100025f7-1000260a CreateEventA 69->85 70->71 71->4 88 100027a7-100027aa 71->88 107 100029d0-100029e4 72->107 108 10002d19 72->108 91 100029f1-100029f5 73->91 79->4 79->8 80->81 86 10002d25-10002d2c 81->86 87 10002d47-10002d4c 81->87 93 10002658 GetLastError 85->93 94 1000260c-10002619 CreateEventA 85->94 95 10002d35-10002d41 CloseHandle 86->95 96 10002d2e 86->96 99 10002d51-10002da3 wsprintfA * 4 87->99 100 10002d4e 87->100 88->4 97 100027b0-100027b8 call 10002357 88->97 102 100028d7-1000290c call 10001fcf call 10001f41 90->102 103 100028ce-100028d2 call 10001fcf 90->103 91->91 104 100029f7-10002a08 GetCommandLineA 91->104 109 1000265e-10002663 93->109 94->93 105 1000261b-1000263a CreateFileMappingA 94->105 95->87 96->95 97->4 99->79 100->99 135 10002918-10002929 call 10001fcf 102->135 136 1000290e-10002913 call 10001fcf 102->136 103->102 112 10002a0a-10002a0d 104->112 113 10002a0f-10002a14 104->113 105->93 114 1000263c-10002652 MapViewOfFile 105->114 107->81 108->81 109->1 116 10002665-10002680 CreateThread 109->116 118 10002a17-10002a35 IsWindowVisible 112->118 113->118 114->93 119 10002654-10002656 114->119 120 10002682-10002688 GetLastError 116->120 121 1000268a-1000269a WaitForSingleObject 116->121 123 10002b6a-10002b83 call 10001bff 118->123 124 10002a3b-10002a4c GetModuleHandleA 118->124 119->109 126 100026af 120->126 127 100026ac 121->127 128 1000269c-100026a6 GetExitCodeThread 121->128 123->108 139 10002b89-10002b8b 123->139 130 10002a6d-10002a7c 124->130 131 10002a4e-10002a67 CreateDialogParamA 124->131 126->1 127->126 128->127 132 10002a83-10002ad5 GetWindowLongA SetWindowLongA SetWindowPos LoadIconA FindWindowExA 130->132 133 10002a7e 130->133 131->123 131->130 138 10002aeb-10002af0 132->138 133->132 135->4 145 1000292f-10002944 SetCurrentDirectoryA 135->145 136->135 142 10002af2-10002b68 GetDlgItem ShowWindow GetClientRect SetWindowPos GetWindowLongA SetWindowLongA SendMessageA * 2 ShowWindow 138->142 143 10002ad7-10002ae5 ShowWindow FindWindowExA 138->143 139->108 144 10002b91 139->144 142->123 143->138 146 10002b97-10002b9a 144->146 145->4 147 10002ba5-10002bb0 GlobalAlloc 146->147 148 10002b9c-10002b9f GlobalFree 146->148 149 10002bb2-10002bb9 147->149 150 10002bbb-10002bc8 GetModuleFileNameA 147->150 148->147 151 10002bca-10002bd4 149->151 150->151 152 10002bdb-10002bf6 lstrlenA GlobalAlloc 150->152 151->146 153 10002bd6 151->153 154 10002c04-10002c23 wsprintfA 152->154 155 10002bf8-10002bff 152->155 153->108 156 10002c25-10002c31 call 1000197e 154->156 157 10002c3f-10002c4c SetForegroundWindow 154->157 155->108 156->157 165 10002c33-10002c3a 156->165 159 10002c6b-10002c7c call 10001d52 ShellExecuteExA 157->159 160 10002c4e-10002c55 call 10001b94 157->160 167 10002c83-10002c89 GetLastError 159->167 168 10002c7e-10002c81 159->168 160->159 169 10002c57-10002c69 call 10001928 160->169 165->108 170 10002c8c-10002c92 UnhookWindowsHookEx 167->170 168->170 172 10002c98-10002c9b 169->172 170->172 172->108 174 10002c9d-10002ca3 GetCurrentProcessId GetCurrentThreadId 172->174 175 10002ca9-10002cbf MsgWaitForMultipleObjects 174->175 176 10002cc1-10002cc2 175->176 177 10002ccf-10002cf9 GetExitCodeProcess 175->177 178 10002cc4-10002ccd call 10001ecd 176->178 179 10002cfb-10002d01 GetLastError 176->179 180 10002d04-10002d14 CloseHandle 177->180 178->175 179->180 180->108 182 10002d16 180->182 182->108
                            APIs
                            • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,10004314,00000001), ref: 10002601
                            • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 10002610
                            • CreateFileMappingA.KERNEL32(000000FF,00000000,08000004,00000000,?,00000000), ref: 1000262D
                            • MapViewOfFile.KERNELBASE(00000000,000F001F,00000000,00000000,00000000), ref: 10002645
                            • CreateThread.KERNELBASE(00000000,00000001,10002218,00000000,00000000,00000000), ref: 10002673
                            • GetLastError.KERNEL32 ref: 10002682
                            • GetCurrentProcessId.KERNEL32 ref: 100026B8
                            • GetCurrentThreadId.KERNEL32 ref: 100026BA
                            • SendMessageA.USER32(00008004,0000053A,00000000), ref: 10002753
                            • GetCurrentProcessId.KERNEL32 ref: 1000275E
                            • GetCurrentThreadId.KERNEL32 ref: 10002760
                            • SetWindowLongA.USER32(?,000000FC,10002489), ref: 10002784
                            • GetCurrentProcessId.KERNEL32 ref: 100027BD
                            • GetCurrentThreadId.KERNEL32 ref: 100027BF
                            • wsprintfA.USER32 ref: 100027EF
                            • GetCurrentProcessId.KERNEL32 ref: 100027F8
                            • GetCurrentProcessId.KERNEL32 ref: 100027FF
                            • GetCurrentThreadId.KERNEL32 ref: 10002801
                            • wsprintfA.USER32 ref: 10002831
                            • GetLastError.KERNEL32 ref: 1000283A
                            • GetCurrentProcessId.KERNEL32 ref: 10002843
                              • Part of subcall function 10002E72: CharNextA.USER32(?,?,?,00000000,?,?,1000285D,?,00000000,00000000), ref: 10002EAB
                              • Part of subcall function 10002E72: CharNextA.USER32(00000000,?,?,1000285D,?,00000000,00000000), ref: 10002EB8
                              • Part of subcall function 10002E72: CharNextA.USER32(?,?,?,00000000,?,?,1000285D,?,00000000,00000000), ref: 10002F04
                            • SetCurrentDirectoryA.KERNEL32(-10002318,00000001,?,00000017,00000001,00000000,00000000,?,00000017,?,00000000,00000000), ref: 1000293E
                            • wsprintfA.USER32 ref: 1000271F
                              • Part of subcall function 10002E29: GetVersionExA.KERNEL32(00000094,?), ref: 10002E51
                            • PostMessageA.USER32(00008005,00000000,00000000,00000000), ref: 100029AC
                            • GetCommandLineA.KERNEL32(00000000,00000001), ref: 100029FA
                            • IsWindowVisible.USER32(?), ref: 10002A2D
                            • GetModuleHandleA.KERNEL32(00000000), ref: 10002A3C
                            • CreateDialogParamA.USER32(?,0000006F,00000000,10002559,00000000), ref: 10002A5A
                            • GetWindowLongA.USER32(00000000,000000EC), ref: 10002A8F
                            • SetWindowLongA.USER32(?,000000EC,00000000), ref: 10002A9F
                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027), ref: 10002AAF
                            • LoadIconA.USER32(?,00000067), ref: 10002ABA
                            • FindWindowExA.USER32(?,00000000,00000000,00000000), ref: 10002AC9
                            • GetDlgItem.USER32(?,00000406), ref: 10002AFA
                            • ShowWindow.USER32(00000000,00000005), ref: 10002B06
                            • GetClientRect.USER32(?,?), ref: 10002B0F
                            • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000014), ref: 10002B23
                            • GetWindowLongA.USER32(?,000000F0), ref: 10002B2E
                              • Part of subcall function 10002357: GetWindowThreadProcessId.USER32(?,?), ref: 10002378
                              • Part of subcall function 10002357: OpenProcess.KERNEL32(00000040,00000000,?,SeDebugPrivilege,00000001,?), ref: 10002395
                              • Part of subcall function 10002357: GetLastError.KERNEL32 ref: 100023A2
                            • CloseHandle.KERNEL32(?), ref: 10002D3B
                            • wsprintfA.USER32 ref: 10002D65
                            • wsprintfA.USER32 ref: 10002D77
                            • wsprintfA.USER32 ref: 10002D88
                            • wsprintfA.USER32 ref: 10002D9D
                            • GlobalFree.KERNEL32(?), ref: 10002DBC
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976574315.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                            • Associated: 00000001.00000002.2976553438.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000001.00000002.2976597083.0000000010004000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000001.00000002.2976619836.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_10000000_Au_.jbxd
                            Similarity
                            • API ID: Current$Window$Process$wsprintf$Thread$Create$Long$CharErrorLastNext$EventFileHandleMessage$ClientCloseCommandDialogDirectoryFindFreeGlobalIconItemLineLoadMappingModuleOpenParamPostRectSendShowVersionViewVisible
                            • String ID: /UAC:%X /NCRC%s$runas$seclogon
                            • API String ID: 4203222356-462553597
                            • Opcode ID: b8bffdd8edf15f6d2e6f2047910d3067d7e53094fbef8e7a65abfebefa32b766
                            • Instruction ID: ddd6d321f0c270f260a7080946e7e23422a5c93e7fb2e2ebcac8c0dbbdaa7338
                            • Opcode Fuzzy Hash: b8bffdd8edf15f6d2e6f2047910d3067d7e53094fbef8e7a65abfebefa32b766
                            • Instruction Fuzzy Hash: F94249B4904299AFFB01DFA4CC89ADE7FB9EB043C4F114066F544A7269DB708E85CB61

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 184 40323c-4032d1 #17 SetErrorMode OleInitialize call 405e88 SHGetFileInfoA call 405b66 GetCommandLineA call 405b66 GetModuleHandleA 191 4032d3-4032d8 184->191 192 4032dd-4032f2 call 405684 CharNextA 184->192 191->192 195 403357-40335b 192->195 196 4032f4-4032f7 195->196 197 40335d 195->197 198 4032f9-4032fd 196->198 199 4032ff-403307 196->199 200 403370-403388 GetTempPathA call 403208 197->200 198->198 198->199 201 403309-40330a 199->201 202 40330f-403312 199->202 209 4033aa-4033c1 DeleteFileA call 402c72 200->209 210 40338a-4033a8 GetWindowsDirectoryA lstrcatA call 403208 200->210 201->202 204 403314-403318 202->204 205 403347-403354 call 405684 202->205 207 403328-40332e 204->207 208 40331a-403323 204->208 205->195 222 403356 205->222 214 403330-403339 207->214 215 40333e-403345 207->215 208->207 212 403325 208->212 224 403428-403437 call 4035bd OleUninitialize 209->224 225 4033c3-4033c9 209->225 210->209 210->224 212->207 214->215 219 40333b 214->219 215->205 220 40335f-40336b call 405b66 215->220 219->215 220->200 222->195 232 403522-403528 224->232 233 40343d-40344d call 405427 ExitProcess 224->233 227 403418-40341f call 4036af 225->227 228 4033cb-4033d4 call 405684 225->228 234 403424 227->234 236 4033df-4033e1 228->236 238 4035a5-4035ad 232->238 239 40352a-403547 call 405e88 * 3 232->239 234->224 242 4033e3-4033ed 236->242 243 4033d6-4033dc 236->243 240 4035b3-4035b7 ExitProcess 238->240 241 4035af 238->241 264 403591-40359c ExitWindowsEx 239->264 265 403549-40354b 239->265 241->240 247 403453-40346d lstrcatA lstrcmpiA 242->247 248 4033ef-4033fc call 40573a 242->248 243->242 246 4033de 243->246 246->236 247->224 252 40346f-403484 CreateDirectoryA SetCurrentDirectoryA 247->252 248->224 258 4033fe-403414 call 405b66 * 2 248->258 255 403491-4034ab call 405b66 252->255 256 403486-40348c call 405b66 252->256 267 4034b0-4034cc call 405b88 DeleteFileA 255->267 256->255 258->227 264->238 271 40359e-4035a0 call 40140b 264->271 265->264 268 40354d-40354f 265->268 276 40350d-403514 267->276 277 4034ce-4034de CopyFileA 267->277 268->264 272 403551-403563 GetCurrentProcess 268->272 271->238 272->264 282 403565-403587 272->282 276->267 280 403516-40351d call 4058b4 276->280 277->276 278 4034e0-403500 call 4058b4 call 405b88 call 4053c6 277->278 278->276 291 403502-403509 CloseHandle 278->291 280->224 282->264 291->276
                            APIs
                            • #17.COMCTL32 ref: 0040325B
                            • SetErrorMode.KERNELBASE(00008001), ref: 00403266
                            • OleInitialize.OLE32(00000000), ref: 0040326D
                              • Part of subcall function 00405E88: GetModuleHandleA.KERNEL32(?,?,00000000,0040327F,00000008), ref: 00405E9A
                              • Part of subcall function 00405E88: LoadLibraryA.KERNELBASE(?,?,00000000,0040327F,00000008), ref: 00405EA5
                              • Part of subcall function 00405E88: GetProcAddress.KERNEL32(00000000,?), ref: 00405EB6
                            • SHGetFileInfoA.SHELL32(00429C58,00000000,?,00000160,00000000,00000008), ref: 00403295
                              • Part of subcall function 00405B66: lstrcpynA.KERNEL32(?,?,00002000,004032AA,00442EA0,NSIS Error), ref: 00405B73
                            • GetCommandLineA.KERNEL32(00442EA0,NSIS Error), ref: 004032AA
                            • GetModuleHandleA.KERNEL32(00000000,"C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exe" ,00000000), ref: 004032BD
                            • CharNextA.USER32(00000000,"C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exe" ,00000020), ref: 004032E8
                            • GetTempPathA.KERNEL32(00002000,00479000,00000000,00000020), ref: 0040337B
                            • GetWindowsDirectoryA.KERNEL32(00479000,00001FFB), ref: 00403390
                            • lstrcatA.KERNEL32(00479000,\Temp), ref: 0040339C
                            • DeleteFileA.KERNELBASE(00477000), ref: 004033AF
                            • OleUninitialize.OLE32(00000000), ref: 0040342D
                            • ExitProcess.KERNEL32 ref: 0040344D
                            • lstrcatA.KERNEL32(00479000,~nsu.tmp,"C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exe" ,00000000,00000000), ref: 00403459
                            • lstrcmpiA.KERNEL32(00479000,00475000), ref: 00403465
                            • CreateDirectoryA.KERNEL32(00479000,00000000), ref: 00403471
                            • SetCurrentDirectoryA.KERNEL32(00479000), ref: 00403478
                            • DeleteFileA.KERNEL32(00427C58,00427C58,?,00447000,?), ref: 004034C2
                            • CopyFileA.KERNEL32(0047D000,00427C58,00000001), ref: 004034D6
                            • CloseHandle.KERNEL32(00000000,00427C58,00427C58,?,00427C58,00000000), ref: 00403503
                            • GetCurrentProcess.KERNEL32(00000028,?,00000005,00000004,00000003), ref: 00403558
                            • ExitWindowsEx.USER32(00000002,00000000), ref: 00403594
                            • ExitProcess.KERNEL32 ref: 004035B7
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2972549926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000001.00000002.2972517186.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972577518.0000000000407000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000409000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000413000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000416000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000041F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000046F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972789889.000000000052B000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_400000_Au_.jbxd
                            Similarity
                            • API ID: File$DirectoryExitHandleProcess$CurrentDeleteModuleWindowslstrcat$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextPathProcTempUninitializelstrcmpilstrcpyn
                            • String ID: /D=$ _?=$"$"C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exe" $Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$NCRC$NSIS Error$SeShutdownPrivilege$X|B$\Temp$~nsu.tmp
                            • API String ID: 2278157092-1326790807
                            • Opcode ID: 3856c4f3656841d568976691278b522b5e2a55f01133d82e53ebf5050a868fc5
                            • Instruction ID: b18730c7e9b155b38634e246beb7c9543dbde463d43dfe3db889f1e824801833
                            • Opcode Fuzzy Hash: 3856c4f3656841d568976691278b522b5e2a55f01133d82e53ebf5050a868fc5
                            • Instruction Fuzzy Hash: 6B91C3319087417EE7216F619C49B6B7EACEB0134AF44453BF885B61E2C77C5A048B6F

                            Control-flow Graph

                            APIs
                            • GetCurrentProcessId.KERNEL32(?,?,?,00000000), ref: 6E5AD039
                            • ProcessIdToSessionId.KERNEL32(00000000,?,?,00000000), ref: 6E5AD040
                            • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,?,00000000), ref: 6E5AD049
                            • _memset.LIBCMT ref: 6E5AD05E
                            • Process32First.KERNEL32(00000000,?), ref: 6E5AD078
                            • ProcessIdToSessionId.KERNELBASE(?,?,?,?,00000000), ref: 6E5AD093
                            • Process32Next.KERNEL32(00000000,00000128), ref: 6E5AD0C6
                            • CloseHandle.KERNEL32(00000000,?,?,00000000), ref: 6E5AD0DF
                            • OpenProcess.KERNEL32(00000400,00000000,00000000,?,?,00000000), ref: 6E5AD0EC
                            • OpenProcessToken.ADVAPI32(00000000,00000008,?,?,?,00000000), ref: 6E5AD101
                            • CloseHandle.KERNEL32(00000000,?,?,00000000), ref: 6E5AD113
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: Process$CloseHandleOpenProcess32Session$CreateCurrentFirstNextSnapshotTokenToolhelp32_memset
                            • String ID: explorer.exe
                            • API String ID: 2042333109-3187896405
                            • Opcode ID: 6121bc447ca71dcfeb5227fc4dd5cb2363ee95063a191bd5d9e52a791c1ec8bf
                            • Instruction ID: f28419820d7cf6337e3b93d044b8e5821a4a022e7191e159718447e2d478b931
                            • Opcode Fuzzy Hash: 6121bc447ca71dcfeb5227fc4dd5cb2363ee95063a191bd5d9e52a791c1ec8bf
                            • Instruction Fuzzy Hash: 8D31737190162C9FDB11AFA98C84AEEB7FCBF4A314F0504AAFA05E2140DB349E45CF65

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 765 40548b-4054a6 call 40573a 768 4054a8-4054ba DeleteFileA 765->768 769 4054bf-4054c9 765->769 770 405653-405656 768->770 771 4054cb-4054cd 769->771 772 4054dd-4054eb call 405b66 769->772 773 4054d3-4054d7 771->773 774 4055fe-405604 771->774 780 4054fa-4054fb call 4056a0 772->780 781 4054ed-4054f8 lstrcatA 772->781 773->772 773->774 774->770 777 405606-405609 774->777 778 405613-40561b call 405e61 777->778 779 40560b-405611 777->779 778->770 788 40561d-405632 call 405659 call 40581e RemoveDirectoryA 778->788 779->770 783 405500-405503 780->783 781->783 786 405505-40550c 783->786 787 40550e-405514 lstrcatA 783->787 786->787 789 405519-405537 lstrlenA FindFirstFileA 786->789 787->789 804 405634-405638 788->804 805 40564b-40564e call 404f04 788->805 791 4055f4-4055f8 789->791 792 40553d-405554 call 405684 789->792 791->774 794 4055fa 791->794 798 405556-40555a 792->798 799 40555f-405562 792->799 794->774 798->799 801 40555c 798->801 802 405564-405569 799->802 803 405575-405583 call 405b66 799->803 801->799 807 4055d3-4055e5 FindNextFileA 802->807 808 40556b-40556d 802->808 815 405585-40558d 803->815 816 40559a-4055a9 call 40581e DeleteFileA 803->816 804->779 810 40563a-405649 call 404f04 call 4058b4 804->810 805->770 807->792 813 4055eb-4055ee FindClose 807->813 808->803 811 40556f-405573 808->811 810->770 811->803 811->807 813->791 815->807 818 40558f-405598 call 40548b 815->818 824 4055cb-4055ce call 404f04 816->824 825 4055ab-4055af 816->825 818->807 824->807 827 4055b1-4055c1 call 404f04 call 4058b4 825->827 828 4055c3-4055c9 825->828 827->807 828->807
                            APIs
                            • DeleteFileA.KERNELBASE(?,?,"C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exe" ,74DF2EE0), ref: 004054A9
                            • lstrcatA.KERNEL32(00439CA8,\*.*,00439CA8,?,00000000,?,"C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exe" ,74DF2EE0), ref: 004054F3
                            • lstrcatA.KERNEL32(?,00409010,?,00439CA8,?,00000000,?,"C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exe" ,74DF2EE0), ref: 00405514
                            • lstrlenA.KERNEL32(?,?,00409010,?,00439CA8,?,00000000,?,"C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exe" ,74DF2EE0), ref: 0040551A
                            • FindFirstFileA.KERNEL32(00439CA8,?,?,?,00409010,?,00439CA8,?,00000000,?,"C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exe" ,74DF2EE0), ref: 0040552B
                            • FindNextFileA.KERNEL32(?,00000010,000000F2,?), ref: 004055DD
                            • FindClose.KERNEL32(?), ref: 004055EE
                            Strings
                            • \*.*, xrefs: 004054ED
                            • "C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exe" , xrefs: 00405495
                            Memory Dump Source
                            • Source File: 00000001.00000002.2972549926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000001.00000002.2972517186.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972577518.0000000000407000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000409000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000413000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000416000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000041F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000046F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972789889.000000000052B000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_400000_Au_.jbxd
                            Similarity
                            • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                            • String ID: "C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exe" $\*.*
                            • API String ID: 2035342205-1696835193
                            • Opcode ID: 7a59cae7945815ac72422d941512dfd3c75fd7012d972d378295304f1a731b5f
                            • Instruction ID: c21d71015f388e95bcdaf446d79f8f0681b512570eb11bb529d8bb9f749da999
                            • Opcode Fuzzy Hash: 7a59cae7945815ac72422d941512dfd3c75fd7012d972d378295304f1a731b5f
                            • Instruction Fuzzy Hash: C0510431804A447ADB216B218C45BBF3B79DF42728F14847BF915711D2C73C5A85DE6E
                            APIs
                            • GetDlgItem.USER32(?,00000000), ref: 06D917A0
                            • GetWindowRect.USER32(00000000,?), ref: 06D917AB
                            • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 06D917BB
                            • CreateDialogParamA.USER32(00000001,?,06D914CA,00000000), ref: 06D917D0
                            • SetWindowPos.USER32(00000000,00000000,?,?,?,?,00000014), ref: 06D91803
                            • SetWindowLongA.USER32(?,00000004,06D913FB), ref: 06D91811
                            • GetProcessHeap.KERNEL32(00000008,00000000), ref: 06D9182B
                            • HeapAlloc.KERNEL32(00000000), ref: 06D91832
                              • Part of subcall function 06D91E27: GlobalAlloc.KERNEL32(00000040,?,?,06D910BE,error,?,00000104), ref: 06D91E3C
                              • Part of subcall function 06D91E27: lstrcpynA.KERNEL32(00000004,?,?,06D910BE,error,?,00000104), ref: 06D91E52
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976302121.0000000006D91000.00000020.00000001.01000000.00000009.sdmp, Offset: 06D90000, based on PE: true
                            • Associated: 00000001.00000002.2976276508.0000000006D90000.00000002.00000001.01000000.00000009.sdmpDownload File
                            • Associated: 00000001.00000002.2976439780.0000000006D93000.00000002.00000001.01000000.00000009.sdmpDownload File
                            • Associated: 00000001.00000002.2976488802.0000000006D94000.00000008.00000001.01000000.00000009.sdmpDownload File
                            • Associated: 00000001.00000002.2976529163.0000000006D97000.00000002.00000001.01000000.00000009.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6d90000_Au_.jbxd
                            Similarity
                            • API ID: Window$AllocHeap$CreateDialogGlobalItemLongParamPointsProcessRectlstrcpyn
                            • String ID: error
                            • API String ID: 1928716940-1574812785
                            • Opcode ID: e0e62d2981085f6c0e0094d4803554541625bbe32c0f6b0b56ccfa3d9f4dff0d
                            • Instruction ID: 90356f27d08473f429ec0e3ba91dcef33b443c9ddced2315ee5a58de08bcc0c7
                            • Opcode Fuzzy Hash: e0e62d2981085f6c0e0094d4803554541625bbe32c0f6b0b56ccfa3d9f4dff0d
                            • Instruction Fuzzy Hash: F221DF72900205FFDB42AFA6EC4AEAABBBAFB49704B014129F71997340D7719514CBB0
                            APIs
                            • GetCurrentProcess.KERNEL32(00000028,?,00000000,?), ref: 6E5B5ED5
                            • OpenProcessToken.ADVAPI32(00000000), ref: 6E5B5EDC
                            • LookupPrivilegeValueA.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 6E5B5EEC
                            • AdjustTokenPrivileges.KERNELBASE(?,00000000,?,00000010,00000000,00000000), ref: 6E5B5F1B
                            • CloseHandle.KERNELBASE(?), ref: 6E5B5F2C
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: ProcessToken$AdjustCloseCurrentHandleLookupOpenPrivilegePrivilegesValue
                            • String ID: SeDebugPrivilege
                            • API String ID: 3038321057-2896544425
                            • Opcode ID: ef0608c05089f3788b6fb42c9381303f1378b89c9610e8e323c34e1f3cacdded
                            • Instruction ID: e4cd91c43633cb3203d3904639301cce5a237d735c0af860210607a23b81535b
                            • Opcode Fuzzy Hash: ef0608c05089f3788b6fb42c9381303f1378b89c9610e8e323c34e1f3cacdded
                            • Instruction Fuzzy Hash: 4A11F7B1A0021DAFDF00DFE5DC99AFFBBFCEB09255F41442AB601E3141DA7599488BA4
                            Memory Dump Source
                            • Source File: 00000001.00000002.2972549926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000001.00000002.2972517186.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972577518.0000000000407000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000409000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000413000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000416000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000041F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000046F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972789889.000000000052B000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_400000_Au_.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: d33a5f9df5361017a2c2cd63e74982cac3414c6cd2676332625b738f25334a08
                            • Instruction ID: 7fe690cacb8e5da35aefc448adc87e2f65dc6f56ff44dc44b78e187fa59068bd
                            • Opcode Fuzzy Hash: d33a5f9df5361017a2c2cd63e74982cac3414c6cd2676332625b738f25334a08
                            • Instruction Fuzzy Hash: 70F16871D00229CBDF28CFA8C8946ADBBB1FF44305F25816ED856BB281D7785A96CF44
                            APIs
                            • FindFirstFileA.KERNELBASE(?,0043E4F0,0043BCA8,0040577D,0043BCA8,0043BCA8,00000000,0043BCA8,0043BCA8,?,?,74DF2EE0,0040549F,?,"C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exe" ,74DF2EE0), ref: 00405E6C
                            • FindClose.KERNELBASE(00000000), ref: 00405E78
                            Memory Dump Source
                            • Source File: 00000001.00000002.2972549926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000001.00000002.2972517186.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972577518.0000000000407000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000409000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000413000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000416000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000041F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000046F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972789889.000000000052B000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_400000_Au_.jbxd
                            Similarity
                            • API ID: Find$CloseFileFirst
                            • String ID:
                            • API String ID: 2295610775-0
                            • Opcode ID: 01e595e2f3112a2de1d0a49937830070d80cc3437c46873e90b3c13b0457b4b6
                            • Instruction ID: ad08286ca6cff15a9a126e67a78f5d7bda1c091ca2a48e653f649c3583465e9e
                            • Opcode Fuzzy Hash: 01e595e2f3112a2de1d0a49937830070d80cc3437c46873e90b3c13b0457b4b6
                            • Instruction Fuzzy Hash: 9CD012359495205FC7001739AC0C85B7A58EF593347108B32F969F62E0C7749D52CAED

                            Control-flow Graph

                            APIs
                            • GetProcessHeap.KERNEL32(00000008,?), ref: 06D9186E
                            • HeapAlloc.KERNEL32(00000000), ref: 06D91871
                            • GetProcessHeap.KERNEL32(00000000,00000000,error,00000000,00000000), ref: 06D918E4
                            • HeapFree.KERNEL32(00000000), ref: 06D91B18
                              • Part of subcall function 06D91E27: GlobalAlloc.KERNEL32(00000040,?,?,06D910BE,error,?,00000104), ref: 06D91E3C
                              • Part of subcall function 06D91E27: lstrcpynA.KERNEL32(00000004,?,?,06D910BE,error,?,00000104), ref: 06D91E52
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976302121.0000000006D91000.00000020.00000001.01000000.00000009.sdmp, Offset: 06D90000, based on PE: true
                            • Associated: 00000001.00000002.2976276508.0000000006D90000.00000002.00000001.01000000.00000009.sdmpDownload File
                            • Associated: 00000001.00000002.2976439780.0000000006D93000.00000002.00000001.01000000.00000009.sdmpDownload File
                            • Associated: 00000001.00000002.2976488802.0000000006D94000.00000008.00000001.01000000.00000009.sdmpDownload File
                            • Associated: 00000001.00000002.2976529163.0000000006D97000.00000002.00000001.01000000.00000009.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6d90000_Au_.jbxd
                            Similarity
                            • API ID: Heap$AllocProcess$FreeGloballstrcpyn
                            • String ID: BUTTON$COMBOBOX$EDIT$LINK$LISTBOX$NSIS: nsControl pointer property$RICHEDIT_CLASS$RichEdit$STATIC$error
                            • API String ID: 1913068523-3375361224
                            • Opcode ID: ecc87499cdd2981e785a74711067681dd4bee769c74c626039637e051ea940c3
                            • Instruction ID: f2a3882090f43e01deda3dc6e89e792a8043d71ede228adc6f040f930d4b6963
                            • Opcode Fuzzy Hash: ecc87499cdd2981e785a74711067681dd4bee769c74c626039637e051ea940c3
                            • Instruction Fuzzy Hash: E1816072900305EBDFA19BA6DD45FAABBFDAB04208F114125F609B7241D674E8498BB4

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 338 403a45-403a57 339 403b98-403ba7 338->339 340 403a5d-403a63 338->340 342 403bf6-403c0b 339->342 343 403ba9-403bf1 GetDlgItem * 2 call 403f18 SetClassLongA call 40140b 339->343 340->339 341 403a69-403a72 340->341 346 403a74-403a81 SetWindowPos 341->346 347 403a87-403a8a 341->347 344 403c4b-403c50 call 403f64 342->344 345 403c0d-403c10 342->345 343->342 357 403c55-403c70 344->357 349 403c12-403c1d call 401389 345->349 350 403c43-403c45 345->350 346->347 352 403aa4-403aaa 347->352 353 403a8c-403a9e ShowWindow 347->353 349->350 371 403c1f-403c3e SendMessageA 349->371 350->344 356 403ee5 350->356 358 403ac6-403ac9 352->358 359 403aac-403ac1 DestroyWindow 352->359 353->352 368 403ee7-403eee 356->368 366 403c72-403c74 call 40140b 357->366 367 403c79-403c7f 357->367 363 403acb-403ad7 SetWindowLongA 358->363 364 403adc-403ae2 358->364 361 403ec2-403ec8 359->361 361->356 372 403eca-403ed0 361->372 363->368 369 403b85-403b93 call 403f7f 364->369 370 403ae8-403af9 GetDlgItem 364->370 366->367 374 403ea3-403ebc DestroyWindow EndDialog 367->374 375 403c85-403c90 367->375 369->368 376 403b18-403b1b 370->376 377 403afb-403b12 SendMessageA IsWindowEnabled 370->377 371->368 372->356 379 403ed2-403edb ShowWindow 372->379 374->361 375->374 380 403c96-403ce3 call 405b88 call 403f18 * 3 GetDlgItem 375->380 382 403b20-403b23 376->382 383 403b1d-403b1e 376->383 377->356 377->376 379->356 408 403ce5-403cea 380->408 409 403ced-403d29 ShowWindow KiUserCallbackDispatcher call 403f3a EnableWindow 380->409 387 403b31-403b36 382->387 388 403b25-403b2b 382->388 386 403b4e-403b53 call 403ef1 383->386 386->369 391 403b6c-403b7f SendMessageA 387->391 393 403b38-403b3e 387->393 388->391 392 403b2d-403b2f 388->392 391->369 392->386 396 403b40-403b46 call 40140b 393->396 397 403b55-403b5e call 40140b 393->397 406 403b4c 396->406 397->369 405 403b60-403b6a 397->405 405->406 406->386 408->409 412 403d2b-403d2c 409->412 413 403d2e 409->413 414 403d30-403d5e GetSystemMenu EnableMenuItem SendMessageA 412->414 413->414 415 403d60-403d71 SendMessageA 414->415 416 403d73 414->416 417 403d79-403dab call 403f4d call 405b66 lstrlenA call 405b88 SetWindowTextA call 401389 415->417 416->417 425 403db0-403db2 417->425 425->357 426 403db8-403dba 425->426 426->357 427 403dc0-403dc4 426->427 428 403de3-403df7 DestroyWindow 427->428 429 403dc6-403dcc 427->429 428->361 430 403dfd-403e2a CreateDialogParamA 428->430 429->356 431 403dd2-403dd8 429->431 430->361 432 403e30-403e87 call 403f18 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 430->432 431->357 433 403dde 431->433 432->356 438 403e89-403ea1 ShowWindow call 403f64 432->438 433->356 438->361
                            APIs
                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403A81
                            • ShowWindow.USER32(?), ref: 00403A9E
                            • DestroyWindow.USER32 ref: 00403AB2
                            • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403ACE
                            • GetDlgItem.USER32(?,?), ref: 00403AEF
                            • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403B03
                            • IsWindowEnabled.USER32(00000000), ref: 00403B0A
                            • GetDlgItem.USER32(?,00000001), ref: 00403BB8
                            • GetDlgItem.USER32(?,00000002), ref: 00403BC2
                            • SetClassLongA.USER32(?,000000F2,?), ref: 00403BDC
                            • SendMessageA.USER32(0000040F,00000000,00000001,?), ref: 00403C2D
                            • GetDlgItem.USER32(?,00000003), ref: 00403CD3
                            • ShowWindow.USER32(00000000,?), ref: 00403CF4
                            • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403D06
                            • EnableWindow.USER32(?,?), ref: 00403D21
                            • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403D37
                            • EnableMenuItem.USER32(00000000), ref: 00403D3E
                            • SendMessageA.USER32(?,000000F4,00000000,00000001), ref: 00403D56
                            • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00403D69
                            • lstrlenA.KERNEL32(00431CA0,?,00431CA0,00442EA0), ref: 00403D92
                            • SetWindowTextA.USER32(?,00431CA0), ref: 00403DA1
                            • ShowWindow.USER32(?,0000000A), ref: 00403ED5
                            Memory Dump Source
                            • Source File: 00000001.00000002.2972549926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000001.00000002.2972517186.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972577518.0000000000407000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000409000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000413000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000416000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000041F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000046F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972789889.000000000052B000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_400000_Au_.jbxd
                            Similarity
                            • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                            • String ID:
                            • API String ID: 3282139019-0
                            • Opcode ID: d1df2909c8443b3fe88403e5355a949fcc2aa302fcd8f946eb4fa8d1bfdc8f33
                            • Instruction ID: 1fd14b61aacdda538f00b8b16eb253fda244b111fbceed3359c2b62430d0d08c
                            • Opcode Fuzzy Hash: d1df2909c8443b3fe88403e5355a949fcc2aa302fcd8f946eb4fa8d1bfdc8f33
                            • Instruction Fuzzy Hash: 7EC1A075904204ABDB20AF21ED89E2B3E7CEB5670AF50053EF541B11F1C77AA941DB2E

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 441 4036af-4036c7 call 405e88 444 4036c9-4036d9 call 405ac4 441->444 445 4036db-403702 call 405a4d 441->445 454 403725-40374e call 403978 call 40573a 444->454 450 403704-403715 call 405a4d 445->450 451 40371a-403720 lstrcatA 445->451 450->451 451->454 459 403754-403759 454->459 460 4037d5-4037dd call 40573a 454->460 459->460 461 40375b-40377f call 405a4d 459->461 466 4037eb-403810 LoadImageA 460->466 467 4037df-4037e6 call 405b88 460->467 461->460 468 403781-403783 461->468 470 403816-40384c RegisterClassA 466->470 471 40389f-4038a7 call 40140b 466->471 467->466 472 403794-4037a0 lstrlenA 468->472 473 403785-403792 call 405684 468->473 474 403852-40389a SystemParametersInfoA CreateWindowExA 470->474 475 40396e 470->475 482 4038b1-4038bc call 403978 471->482 483 4038a9-4038ac 471->483 480 4037a2-4037b0 lstrcmpiA 472->480 481 4037c8-4037d0 call 405659 call 405b66 472->481 473->472 474->471 478 403970-403977 475->478 480->481 486 4037b2-4037bc GetFileAttributesA 480->486 481->460 494 4038c2-4038df ShowWindow LoadLibraryA 482->494 495 403945-40394d call 404fd6 482->495 483->478 489 4037c2-4037c3 call 4056a0 486->489 490 4037be-4037c0 486->490 489->481 490->481 490->489 496 4038e1-4038e6 LoadLibraryA 494->496 497 4038e8-4038fa GetClassInfoA 494->497 502 403967-403969 call 40140b 495->502 503 40394f-403955 495->503 496->497 500 403912-403935 DialogBoxParamA call 40140b 497->500 501 4038fc-40390c GetClassInfoA RegisterClassA 497->501 507 40393a-403943 call 4035ff 500->507 501->500 502->475 503->483 505 40395b-403962 call 40140b 503->505 505->483 507->478
                            APIs
                              • Part of subcall function 00405E88: GetModuleHandleA.KERNEL32(?,?,00000000,0040327F,00000008), ref: 00405E9A
                              • Part of subcall function 00405E88: LoadLibraryA.KERNELBASE(?,?,00000000,0040327F,00000008), ref: 00405EA5
                              • Part of subcall function 00405E88: GetProcAddress.KERNEL32(00000000,?), ref: 00405EB6
                            • lstrcatA.KERNEL32(00477000,00431CA0,80000001,Control Panel\Desktop\ResourceLocale,00000000,00431CA0,00000000,00000006,"C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exe" ,00000000,00479000,00000000), ref: 00403720
                            • lstrlenA.KERNEL32(Show,?,?,?,Show,00000000,00471000,00477000,00431CA0,80000001,Control Panel\Desktop\ResourceLocale,00000000,00431CA0,00000000,00000006,"C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exe" ), ref: 00403795
                            • lstrcmpiA.KERNEL32(?,.exe), ref: 004037A8
                            • GetFileAttributesA.KERNEL32(Show), ref: 004037B3
                            • LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,00471000), ref: 004037FC
                              • Part of subcall function 00405AC4: wsprintfA.USER32 ref: 00405AD1
                            • RegisterClassA.USER32 ref: 00403843
                            • SystemParametersInfoA.USER32(00000030,00000000,_Nb,00000000), ref: 0040385B
                            • CreateWindowExA.USER32(00000080,?,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403894
                            • ShowWindow.USER32(00000005,00000000), ref: 004038CA
                            • LoadLibraryA.KERNELBASE(RichEd20), ref: 004038DB
                            • LoadLibraryA.KERNEL32(RichEd32), ref: 004038E6
                            • GetClassInfoA.USER32(00000000,RichEdit20A,00442E40), ref: 004038F6
                            • GetClassInfoA.USER32(00000000,RichEdit,00442E40), ref: 00403903
                            • RegisterClassA.USER32(00442E40), ref: 0040390C
                            • DialogBoxParamA.USER32(?,00000000,00403A45,00000000), ref: 0040392B
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2972549926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000001.00000002.2972517186.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972577518.0000000000407000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000409000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000413000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000416000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000041F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000046F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972789889.000000000052B000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_400000_Au_.jbxd
                            Similarity
                            • API ID: ClassLoad$InfoLibrary$RegisterWindow$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                            • String ID: "C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exe" $.DEFAULT\Control Panel\International$.exe$@.D$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$Show$_Nb
                            • API String ID: 914957316-2361814908
                            • Opcode ID: a6de6b6738935fd168663d71524c9ac37fe43b8bdaddfafe1a9c92d4059f03a4
                            • Instruction ID: 3542310957e084efa4f7071889cf7bf748f4eb568de54123e821ab1392b17e28
                            • Opcode Fuzzy Hash: a6de6b6738935fd168663d71524c9ac37fe43b8bdaddfafe1a9c92d4059f03a4
                            • Instruction Fuzzy Hash: 8161E3B46442007FE710AF619D45F2B3AACEB4675AF50443FF940B22E1D7B8AD00CA2E

                            Control-flow Graph

                            APIs
                            • __EH_prolog3_GS.LIBCMT ref: 6E5AD57B
                              • Part of subcall function 6E5A1792: __EH_prolog3.LIBCMT ref: 6E5A18E1
                            • RegOpenKeyExA.KERNELBASE(80000002,?,00000000,00000001), ref: 6E5AD5E0
                            • _memset.LIBCMT ref: 6E5AD602
                            • RegQueryValueExA.KERNELBASE(?,ProfileImagePath,00000000,?,?,?,6E5B2085), ref: 6E5AD637
                            • _memset.LIBCMT ref: 6E5AD673
                            • ExpandEnvironmentStringsA.KERNEL32(?,?,00000104), ref: 6E5AD68A
                            • RegCloseKey.KERNELBASE(?), ref: 6E5AD6B6
                            • __EH_prolog3_GS.LIBCMT ref: 6E5AD6FC
                            • RegOpenKeyExA.KERNELBASE(80000003,?,00000000,00000001,?,0000003C), ref: 6E5AD721
                            • RegCloseKey.KERNELBASE(?,?,00000000,00000001,?,0000003C), ref: 6E5AD731
                            • RegLoadKeyA.ADVAPI32(80000003,?,?), ref: 6E5AD773
                            Strings
                            • \NTUSER.DAT, xrefs: 6E5AD74C
                            • SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList\, xrefs: 6E5AD5A3
                            • ProfileImagePath, xrefs: 6E5AD620
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: CloseH_prolog3_Open_memset$EnvironmentExpandH_prolog3LoadQueryStringsValue
                            • String ID: ProfileImagePath$SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList\$\NTUSER.DAT
                            • API String ID: 3001384537-1680069287
                            • Opcode ID: 4ae5f9ed9e796aa6cb74821f6bd067383e87ecace4c4c4b953e04d9a3cc4884d
                            • Instruction ID: 9e537882a7a30a4a2bbedc09f81e85d8d65e6d458a1cf297058225dfe2424fbb
                            • Opcode Fuzzy Hash: 4ae5f9ed9e796aa6cb74821f6bd067383e87ecace4c4c4b953e04d9a3cc4884d
                            • Instruction Fuzzy Hash: AE515BB19001189BDB24EF98DD98BEEB7FDEB44308F5044A9E609E7140EB749E88CF51

                            Control-flow Graph

                            APIs
                            • CoInitialize.OLE32(00000000), ref: 10002225
                            • CreateWindowExA.USER32(00000080,Static,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 10002244
                            • SetWindowLongA.USER32(00000000,000000FC,1000203A), ref: 1000226B
                            • SetEvent.KERNEL32 ref: 10002277
                            • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000004FF), ref: 10002295
                            • GetLastError.KERNEL32 ref: 100022A2
                            • GetCurrentProcessId.KERNEL32 ref: 100022C9
                            • GetCurrentThreadId.KERNEL32 ref: 100022CB
                            • SetCurrentDirectoryA.KERNEL32(-10002318), ref: 100022EC
                            • SetEvent.KERNEL32(024D0000,?,?), ref: 10002322
                            • GetLastError.KERNEL32 ref: 1000233C
                            • GetCurrentProcessId.KERNEL32 ref: 10002346
                            • GetCurrentThreadId.KERNEL32 ref: 10002348
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976574315.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                            • Associated: 00000001.00000002.2976553438.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000001.00000002.2976597083.0000000010004000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000001.00000002.2976619836.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_10000000_Au_.jbxd
                            Similarity
                            • API ID: Current$ErrorEventLastProcessThreadWindow$CreateDirectoryInitializeLongMultipleObjectsWait
                            • String ID: Static
                            • API String ID: 1011777712-2272013587
                            • Opcode ID: f87cf5b702e5b80ababacfe2cbf545df2d5db53f5eeea3b25a543c0b3abd9a89
                            • Instruction ID: b19a1f2c78ded9c61e6cf6ac1d82f0c9c36c9914aaf08b88ed08d216f752e6fd
                            • Opcode Fuzzy Hash: f87cf5b702e5b80ababacfe2cbf545df2d5db53f5eeea3b25a543c0b3abd9a89
                            • Instruction Fuzzy Hash: E631AEB11043A1AFF304DFA4CC89DAA7BE9FB813C1B115A1AF5818216DDB749A44CB25

                            Control-flow Graph

                            APIs
                            • LoadLibraryA.KERNEL32(ADVAPI32,?,?,?,00000000,100025DF,10004314,00000001), ref: 10001D9C
                            • LoadLibraryA.KERNEL32(ShlWAPI,?,?,00000000,100025DF,10004314,00000001), ref: 10001DA5
                            • GetProcAddress.KERNEL32(00000000,CheckTokenMembership), ref: 10001DB5
                            • LoadLibraryA.KERNELBASE(SECUR32,?,?,00000000,100025DF,10004314,00000001), ref: 10001DC1
                            • GetProcAddress.KERNELBASE(00000000,GetUserNameExA), ref: 10001DC9
                            • GetProcAddress.KERNEL32(00000000,CreateProcessWithLogonW), ref: 10001DD6
                            • GetProcAddress.KERNEL32(00000000,SHGetValueA), ref: 10001DE3
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976574315.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                            • Associated: 00000001.00000002.2976553438.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000001.00000002.2976597083.0000000010004000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000001.00000002.2976619836.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_10000000_Au_.jbxd
                            Similarity
                            • API ID: AddressProc$LibraryLoad
                            • String ID: ADVAPI32$CheckTokenMembership$CreateProcessWithLogonW$GetUserNameExA$SECUR32$SHGetValueA$ShlWAPI
                            • API String ID: 2238633743-3146761024
                            • Opcode ID: 9f578335a7462a9d06165b154334da01859a062d7052b787f04a66628dbe4e7e
                            • Instruction ID: 970619d925c3357b7edda12471f2845ff4177baf837b1f29e5b7fd8b27ec2a06
                            • Opcode Fuzzy Hash: 9f578335a7462a9d06165b154334da01859a062d7052b787f04a66628dbe4e7e
                            • Instruction Fuzzy Hash: ECF09EE1A0526866EA10FBF75C88CCB7F9CDB842D03431426F304D3119DF7465008AA9

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 587 402c72-402cc0 GetTickCount GetModuleFileNameA call 40583d 590 402cc2-402cc7 587->590 591 402ccc-402cfa call 405b66 call 4056a0 call 405b66 GetFileSize 587->591 593 402f11-402f15 590->593 599 402d00-402d17 591->599 600 402dea-402df8 call 402bd3 591->600 602 402d19 599->602 603 402d1b-402d21 call 4031bf 599->603 606 402ec9-402ece 600->606 607 402dfe-402e01 600->607 602->603 608 402d26-402d28 603->608 606->593 609 402e03-402e14 call 4031f1 call 4031bf 607->609 610 402e2d-402e79 GlobalAlloc call 405f62 call 40586c CreateFileA 607->610 611 402e85-402e8d call 402bd3 608->611 612 402d2e-402d34 608->612 630 402e19-402e1b 609->630 635 402e7b-402e80 610->635 636 402e8f-402ebf call 4031f1 call 402f18 610->636 611->606 616 402db4-402db8 612->616 617 402d36-402d4e call 4057fe 612->617 620 402dc1-402dc7 616->620 621 402dba-402dc0 call 402bd3 616->621 617->620 634 402d50-402d57 617->634 626 402dc9-402dd7 call 405ef4 620->626 627 402dda-402de4 620->627 621->620 626->627 627->599 627->600 630->606 638 402e21-402e27 630->638 634->620 637 402d59-402d60 634->637 635->593 647 402ec4-402ec7 636->647 637->620 640 402d62-402d69 637->640 638->606 638->610 640->620 642 402d6b-402d72 640->642 642->620 644 402d74-402d94 642->644 644->606 646 402d9a-402d9e 644->646 648 402da0-402da4 646->648 649 402da6-402dae 646->649 647->606 650 402ed0-402ee1 647->650 648->600 648->649 649->620 651 402db0-402db2 649->651 652 402ee3 650->652 653 402ee9-402eee 650->653 651->620 652->653 654 402eef-402ef5 653->654 654->654 655 402ef7-402f0f call 4057fe 654->655 655->593
                            APIs
                            • GetTickCount.KERNEL32 ref: 00402C86
                            • GetModuleFileNameA.KERNEL32(00000000,0047D000,00002000), ref: 00402CA2
                              • Part of subcall function 0040583D: GetFileAttributesA.KERNELBASE(00000003,00402CB5,0047D000,80000000,00000003), ref: 00405841
                              • Part of subcall function 0040583D: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405863
                            • GetFileSize.KERNEL32(00000000,00000000,0047F000,00000000,00475000,00475000,0047D000,0047D000,80000000,00000003), ref: 00402CEB
                            • GlobalAlloc.KERNELBASE(00000040,00409130), ref: 00402E32
                            Strings
                            • Null, xrefs: 00402D6B
                            • soft, xrefs: 00402D62
                            • Inst, xrefs: 00402D59
                            • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 00402EC9
                            • Error launching installer, xrefs: 00402CC2
                            • "C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exe" , xrefs: 00402C7F
                            • Error writing temporary file. Make sure your temp folder is valid., xrefs: 00402E7B
                            Memory Dump Source
                            • Source File: 00000001.00000002.2972549926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000001.00000002.2972517186.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972577518.0000000000407000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000409000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000413000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000416000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000041F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000046F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972789889.000000000052B000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_400000_Au_.jbxd
                            Similarity
                            • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                            • String ID: "C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exe" $Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                            • API String ID: 2803837635-3734043160
                            • Opcode ID: 3b0b24f37f6badd2fd74752bf169a0ace79c66ec4c6eac9ab668145822c720f9
                            • Instruction ID: 03df0606648b4ab024968444c385b092b5c0145c7837f8ae0f7e4b1fa0432a39
                            • Opcode Fuzzy Hash: 3b0b24f37f6badd2fd74752bf169a0ace79c66ec4c6eac9ab668145822c720f9
                            • Instruction Fuzzy Hash: EB61C171940215ABDB20DF65DE89B9A77B8EB05314F20403BF904B72D2D7BC9E418BAD

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 658 100019ee-10001a3f SetLastError GetVersionExA 659 10001a41-10001a43 658->659 660 10001a4c-10001a5c OpenProcessToken 658->660 661 10001a44-10001a47 659->661 662 10001a62-10001a85 660->662 663 10001b15 660->663 666 10001b18-10001b2a 661->666 664 10001a87-10001a94 662->664 665 10001a98-10001aad GetTokenInformation 662->665 663->666 664->663 677 10001a96 664->677 665->663 669 10001aaf-10001ab8 GetLastError 665->669 667 10001b6a-10001b6f 666->667 668 10001b2c-10001b45 GetTokenInformation 666->668 673 10001b71 667->673 674 10001b73-10001b83 CloseHandle 667->674 670 10001b47-10001b50 668->670 671 10001b5e-10001b67 668->671 669->663 675 10001aba-10001ac9 GlobalAlloc 669->675 670->671 676 10001b52-10001b59 670->676 671->667 673->674 675->663 678 10001acb-10001adc GetTokenInformation 675->678 676->671 679 10001b5b 676->679 677->661 680 10001b0e-10001b0f GlobalFree 678->680 681 10001ade-10001ae5 678->681 679->671 680->663 681->680 682 10001ae7 681->682 683 10001aea-10001af8 EqualSid 682->683 684 10001b01-10001b0c 683->684 685 10001afa 683->685 684->680 684->683 685->684
                            APIs
                            • SetLastError.KERNEL32(00000000,?,74DF2E90,00000000), ref: 10001A17
                            • GetVersionExA.KERNEL32(00000094), ref: 10001A24
                            • OpenProcessToken.ADVAPI32(000000FF,00000008,?), ref: 10001A54
                            • GetTokenInformation.ADVAPI32(?,00000002,00000000,00000000,1000295B), ref: 10001AA9
                            • GetLastError.KERNEL32 ref: 10001AAF
                            • GlobalAlloc.KERNEL32(00000040,1000295B), ref: 10001ABF
                            • GetTokenInformation.ADVAPI32(?,00000002,00000000,1000295B,1000295B), ref: 10001AD8
                            • EqualSid.ADVAPI32(00000004,00000201), ref: 10001AF0
                            • GlobalFree.KERNEL32(00000000), ref: 10001B0F
                            • GetTokenInformation.KERNELBASE(?,00000019(TokenIntegrityLevel),?,0000001E,?), ref: 10001B3D
                            • CloseHandle.KERNEL32(?), ref: 10001B76
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976574315.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                            • Associated: 00000001.00000002.2976553438.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000001.00000002.2976597083.0000000010004000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000001.00000002.2976619836.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_10000000_Au_.jbxd
                            Similarity
                            • API ID: Token$Information$ErrorGlobalLast$AllocCloseEqualFreeHandleOpenProcessVersion
                            • String ID:
                            • API String ID: 3001326878-3916222277
                            • Opcode ID: c7d1740b25f1474719ac38a49dd1d30be75818a02373dd9f99f302537117a0a0
                            • Instruction ID: 8885ee99dfe0ad60422c1baee37923041b56a2e906735ebbe117bcd46d695efb
                            • Opcode Fuzzy Hash: c7d1740b25f1474719ac38a49dd1d30be75818a02373dd9f99f302537117a0a0
                            • Instruction Fuzzy Hash: 9B515872A01229ABEB20CFA0CD48BDEBBF8EF057C5F1141A5E555E3194E7749A84CB60

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 704 405b88-405b93 705 405b95-405ba4 704->705 706 405ba6-405bc3 704->706 705->706 707 405da5-405da9 706->707 708 405bc9-405bd0 706->708 709 405bd5-405bdf 707->709 710 405daf-405db9 707->710 708->707 709->710 713 405be5-405bec 709->713 711 405dc4-405dc5 710->711 712 405dbb-405dbf call 405b66 710->712 712->711 715 405bf2-405c27 713->715 716 405d98 713->716 717 405d42-405d45 715->717 718 405c2d-405c38 GetVersion 715->718 719 405da2-405da4 716->719 720 405d9a-405da0 716->720 723 405d75-405d78 717->723 724 405d47-405d4a 717->724 721 405c52 718->721 722 405c3a-405c3e 718->722 719->707 720->707 727 405c59-405c60 721->727 722->721 730 405c40-405c44 722->730 728 405d86-405d96 lstrlenA 723->728 729 405d7a-405d81 call 405b88 723->729 725 405d5a-405d66 call 405b66 724->725 726 405d4c-405d58 call 405ac4 724->726 741 405d6b-405d71 725->741 726->741 732 405c62-405c64 727->732 733 405c65-405c67 727->733 728->707 729->728 730->721 736 405c46-405c4a 730->736 732->733 739 405ca0-405ca3 733->739 740 405c69-405c84 call 405a4d 733->740 736->721 737 405c4c-405c50 736->737 737->727 744 405cb3-405cb6 739->744 745 405ca5-405cb1 GetSystemDirectoryA 739->745 746 405c89-405c8c 740->746 741->728 743 405d73 741->743 747 405d3a-405d40 call 405dc8 743->747 749 405d20-405d22 744->749 750 405cb8-405cc6 GetWindowsDirectoryA 744->750 748 405d24-405d27 745->748 751 405c92-405c9b call 405b88 746->751 752 405d29-405d2d 746->752 747->728 748->747 748->752 749->748 753 405cc8-405cd2 749->753 750->749 751->748 752->747 758 405d2f-405d35 lstrcatA 752->758 755 405cd4-405cd7 753->755 756 405cec-405d02 SHGetSpecialFolderLocation 753->756 755->756 760 405cd9-405cea 755->760 761 405d04-405d1b SHGetPathFromIDListA CoTaskMemFree 756->761 762 405d1d 756->762 758->747 760->748 760->756 761->748 761->762 762->749
                            APIs
                            • GetVersion.KERNEL32(?,0042DC78,00000000,00404F3C,0042DC78,00000000), ref: 00405C30
                            • GetSystemDirectoryA.KERNEL32(Show,00002000), ref: 00405CAB
                            • GetWindowsDirectoryA.KERNEL32(Show,00002000), ref: 00405CBE
                            • SHGetSpecialFolderLocation.SHELL32(?,00000000), ref: 00405CFA
                            • SHGetPathFromIDListA.SHELL32(00000000,Show), ref: 00405D08
                            • CoTaskMemFree.OLE32(00000000), ref: 00405D13
                            • lstrcatA.KERNEL32(Show,\Microsoft\Internet Explorer\Quick Launch), ref: 00405D35
                            • lstrlenA.KERNEL32(Show,?,0042DC78,00000000,00404F3C,0042DC78,00000000), ref: 00405D87
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2972549926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000001.00000002.2972517186.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972577518.0000000000407000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000409000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000413000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000416000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000041F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000046F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972789889.000000000052B000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_400000_Au_.jbxd
                            Similarity
                            • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                            • String ID: Show$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                            • API String ID: 900638850-2066119300
                            • Opcode ID: d95055c75f5f692918c932c11799aea61300af81de6ec283d83934cb0b8c810f
                            • Instruction ID: 9e5192f8493aa47ebdc16a38911c6d04ebd0228925298aebbb8fa2a4147c3c24
                            • Opcode Fuzzy Hash: d95055c75f5f692918c932c11799aea61300af81de6ec283d83934cb0b8c810f
                            • Instruction Fuzzy Hash: AC510335904A05AAEF215B64DC88B7F3BA4DF56324F24823BE911B62D0D37C5981DF4E

                            Control-flow Graph

                            APIs
                            • __EH_prolog3_GS.LIBCMT ref: 6E5A53F8
                              • Part of subcall function 6E5A57E7: __EH_prolog3.LIBCMT ref: 6E5A57EE
                              • Part of subcall function 6E5A57E7: std::locale::_Init.LIBCPMT ref: 6E5A5806
                            • RegOpenKeyExA.KERNELBASE(?,?,00000000,00020019,00000000,^[0-9]{0,10}\.[0-9]{0,10}\.[0-9]{0,10}\.[0-9]{0,10}$,?,6E5E1704,0000000000.0000000000.0000000000.0000000000), ref: 6E5A5482
                            • _swscanf.LIBCMT ref: 6E5A55A6
                            • _memset.LIBCMT ref: 6E5A55C3
                              • Part of subcall function 6E5A135C: _memmove.LIBCMT ref: 6E5A13C1
                            • RegCloseKey.KERNELBASE(00000000,?,6E5E1704,0000000000.0000000000.0000000000.0000000000), ref: 6E5A569A
                            Strings
                            • 0000000000.0000000000.0000000000.0000000000, xrefs: 6E5A5416
                            • %u.%u.%u.%u, xrefs: 6E5A55A0
                            • %010u.%010u.%010u.%010u, xrefs: 6E5A55E6
                            • ^[0-9]{0,10}\.[0-9]{0,10}\.[0-9]{0,10}\.[0-9]{0,10}$, xrefs: 6E5A5440
                            • 0.0.0.0, xrefs: 6E5A54EA
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: CloseH_prolog3H_prolog3_InitOpen_memmove_memset_swscanfstd::locale::_
                            • String ID: %010u.%010u.%010u.%010u$%u.%u.%u.%u$0.0.0.0$0000000000.0000000000.0000000000.0000000000$^[0-9]{0,10}\.[0-9]{0,10}\.[0-9]{0,10}\.[0-9]{0,10}$
                            • API String ID: 1536882420-71908733
                            • Opcode ID: 91ce8659f5144d90e8ddad24958936a5b4f91e0218e4bdd4bf120040383c9400
                            • Instruction ID: f5392a44547bc869339f7e5d0fccfcb96c2eee6ca11b5cf68c8171d46d4c7116
                            • Opcode Fuzzy Hash: 91ce8659f5144d90e8ddad24958936a5b4f91e0218e4bdd4bf120040383c9400
                            • Instruction Fuzzy Hash: AB814471900218AFDF24CBE8CD90FEDB7B9AF50304F544599E21AAB181EB706E89CF51

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 902 6e5ad79c-6e5ad7e8 call 6e5c1320 call 6e5ad6f5 907 6e5ad7ee-6e5ad833 call 6e5a219d RegOpenKeyExA 902->907 908 6e5ada05-6e5ada0c call 6e5c12cf 902->908 913 6e5ad9fa-6e5ada00 call 6e5a124f 907->913 914 6e5ad839-6e5ad867 call 6e5c0ac0 907->914 913->908 918 6e5ad86b-6e5ad890 RegQueryValueExA 914->918 919 6e5ad869 914->919 920 6e5ad9ee-6e5ad9f4 RegCloseKey 918->920 921 6e5ad896-6e5ad8a1 918->921 919->918 920->913 922 6e5ada2e-6e5ada71 call 6e5be9ec call 6e5c1320 921->922 923 6e5ad8a7-6e5ad8bc 921->923 939 6e5adaef-6e5adb01 call 6e5ad571 call 6e5a2433 922->939 940 6e5ada73-6e5ada74 922->940 924 6e5ada0d-6e5ada2c call 6e5a1641 call 6e5a15c8 923->924 925 6e5ad8c2-6e5ad949 call 6e5a165e call 6e5b6bec call 6e5a124f call 6e5a165e call 6e5a56be call 6e5a2746 call 6e5a124f * 2 923->925 924->920 981 6e5ad94f-6e5ad97b call 6e5a1641 call 6e5a15c8 call 6e5ad571 925->981 982 6e5ad9e3-6e5ad9e9 call 6e5a124f 925->982 964 6e5adb04 call 6e5a124f 939->964 942 6e5ada76-6e5ada77 940->942 943 6e5adab5-6e5adad1 call 6e5a165e call 6e5ad79c 940->943 947 6e5adb09-6e5adb10 call 6e5c12cf 942->947 948 6e5ada7d-6e5ada9a call 6e5a165e call 6e5ad79c 942->948 961 6e5adad6-6e5adaed call 6e5a2433 call 6e5a124f 943->961 967 6e5ada9f-6e5adab3 call 6e5a2433 call 6e5a124f 948->967 961->964 964->947 967->964 989 6e5ad980-6e5ad98b 981->989 982->920 990 6e5ad9d8-6e5ad9de call 6e5a124f 989->990 991 6e5ad98d-6e5ad9d3 call 6e5a56be call 6e5adb2a call 6e5a2433 call 6e5a124f * 2 989->991 990->982 991->990
                            APIs
                            • RegOpenKeyExA.KERNELBASE(80000003,?,00000000,00000001,?), ref: 6E5AD82B
                            • _memset.LIBCMT ref: 6E5AD84D
                            • RegQueryValueExA.KERNELBASE(?,?,00000000,?,?,?,6E5B2085), ref: 6E5AD888
                            • __EH_prolog3_GS.LIBCMT ref: 6E5AD7A6
                              • Part of subcall function 6E5AD571: __EH_prolog3_GS.LIBCMT ref: 6E5AD6FC
                              • Part of subcall function 6E5AD571: RegOpenKeyExA.KERNELBASE(80000003,?,00000000,00000001,?,0000003C), ref: 6E5AD721
                              • Part of subcall function 6E5AD571: RegCloseKey.KERNELBASE(?,?,00000000,00000001,?,0000003C), ref: 6E5AD731
                              • Part of subcall function 6E5A219D: __EH_prolog3.LIBCMT ref: 6E5A21A4
                            • RegCloseKey.ADVAPI32(?), ref: 6E5AD9F4
                            • __EH_prolog3_GS.LIBCMT ref: 6E5ADA3E
                            Strings
                            • AppData, xrefs: 6E5ADA7D
                            • \Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders, xrefs: 6E5AD7EE
                            • %USERPROFILE%, xrefs: 6E5AD8F1
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: H_prolog3_$CloseOpen$H_prolog3QueryValue_memset
                            • String ID: %USERPROFILE%$AppData$\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                            • API String ID: 1156556799-104435484
                            • Opcode ID: 7f7d33490952ff0a7371795f466933c058c6d06ee7232d1e97f162faa4ade3c3
                            • Instruction ID: a490bbb90fc8400c5a206ca5dfcc81e980080da244c2d31e06592f8e2b36c713
                            • Opcode Fuzzy Hash: 7f7d33490952ff0a7371795f466933c058c6d06ee7232d1e97f162faa4ade3c3
                            • Instruction Fuzzy Hash: 468139709012289FDB24DFA8CA51BDEB7F9AF95308F5044D99749A7140EB306F89CF51
                            APIs
                            • lstrlenA.KERNEL32(?), ref: 025024F5
                            • GlobalAlloc.KERNEL32(00000040,?), ref: 0250251F
                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,?), ref: 02502537
                            • GlobalAlloc.KERNEL32(00000040,00000010), ref: 02502546
                            • CLSIDFromString.OLE32(00000000,00000000), ref: 02502553
                            • GlobalFree.KERNEL32(00000000), ref: 0250255A
                            • GlobalFree.KERNELBASE(00000000), ref: 0250258E
                              • Part of subcall function 02501550: lstrcpyA.KERNEL32(00000000,?,02501607,?,025011A1,-000000A0), ref: 0250155A
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2973409424.0000000002501000.00000020.00000001.01000000.00000008.sdmp, Offset: 02500000, based on PE: true
                            • Associated: 00000001.00000002.2973389138.0000000002500000.00000002.00000001.01000000.00000008.sdmpDownload File
                            • Associated: 00000001.00000002.2973429594.0000000002503000.00000002.00000001.01000000.00000008.sdmpDownload File
                            • Associated: 00000001.00000002.2973449141.0000000002505000.00000002.00000001.01000000.00000008.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_2500000_Au_.jbxd
                            Similarity
                            • API ID: Global$AllocFree$ByteCharFromMultiStringWidelstrcpylstrlen
                            • String ID: @Hmu
                            • API String ID: 520554397-887474944
                            • Opcode ID: e764d93d6f0044be3afa383e6023ea22db77ee8a390343bb5b64386ecb4ad68e
                            • Instruction ID: a6fa219e3a55f6d96488bd4d5a92c23d2f614c0499a1ee7fec8a4d61f572bf7f
                            • Opcode Fuzzy Hash: e764d93d6f0044be3afa383e6023ea22db77ee8a390343bb5b64386ecb4ad68e
                            • Instruction Fuzzy Hash: 58418B719052029FD7209F64DCE8B3A7BF8FB84315F144959ED4ADA5C0DB70A884CB6E
                            APIs
                            • SendMessageA.USER32(?,0000040D,00000000), ref: 06D91C71
                            • ShowWindow.USER32(00000008), ref: 06D91C7F
                            • KiUserCallbackDispatcher.NTDLL(?,00000000,00000000,00000000), ref: 06D91C9B
                            • IsDialogMessageA.USER32(?), ref: 06D91CAB
                            • IsDialogMessageA.USER32(?), ref: 06D91CBB
                            • TranslateMessage.USER32(?), ref: 06D91CC5
                            • DispatchMessageA.USER32(?), ref: 06D91CCF
                            • SetWindowLongA.USER32(?,00000004), ref: 06D91CE9
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976302121.0000000006D91000.00000020.00000001.01000000.00000009.sdmp, Offset: 06D90000, based on PE: true
                            • Associated: 00000001.00000002.2976276508.0000000006D90000.00000002.00000001.01000000.00000009.sdmpDownload File
                            • Associated: 00000001.00000002.2976439780.0000000006D93000.00000002.00000001.01000000.00000009.sdmpDownload File
                            • Associated: 00000001.00000002.2976488802.0000000006D94000.00000008.00000001.01000000.00000009.sdmpDownload File
                            • Associated: 00000001.00000002.2976529163.0000000006D97000.00000002.00000001.01000000.00000009.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6d90000_Au_.jbxd
                            Similarity
                            • API ID: Message$DialogWindow$CallbackDispatchDispatcherLongSendShowTranslateUser
                            • String ID:
                            • API String ID: 4159918924-0
                            • Opcode ID: 9e27d73ac1fd1a098ef129b5778d4683a7b407bacddc5a55fa9cf91356b5442e
                            • Instruction ID: 66b9fb42f1deb04f328a21f2089ce901ff374097b19388025dc0669a5baa66c3
                            • Opcode Fuzzy Hash: 9e27d73ac1fd1a098ef129b5778d4683a7b407bacddc5a55fa9cf91356b5442e
                            • Instruction Fuzzy Hash: 6711053180020AABCF12AFA7FD09EAA7BBFFB45605B414021F70992294D7309415CBB0
                            APIs
                            • lstrcatA.KERNEL32(00000000,00000000,Show,00473000,00000000,00000000,00000031), ref: 00401773
                            • CompareFileTime.KERNEL32(-00000014,?,Show,Show,00000000,00000000,Show,00473000,00000000,00000000,00000031), ref: 0040179D
                              • Part of subcall function 00405B66: lstrcpynA.KERNEL32(?,?,00002000,004032AA,00442EA0,NSIS Error), ref: 00405B73
                              • Part of subcall function 00404F04: lstrlenA.KERNEL32(0042DC78,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C4A,00000000,?), ref: 00404F3D
                              • Part of subcall function 00404F04: lstrlenA.KERNEL32(00402C4A,0042DC78,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C4A,00000000), ref: 00404F4D
                              • Part of subcall function 00404F04: lstrcatA.KERNEL32(0042DC78,00402C4A,00402C4A,0042DC78,00000000,00000000,00000000), ref: 00404F60
                              • Part of subcall function 00404F04: SetWindowTextA.USER32(0042DC78,0042DC78), ref: 00404F72
                              • Part of subcall function 00404F04: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404F98
                              • Part of subcall function 00404F04: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404FB2
                              • Part of subcall function 00404F04: SendMessageA.USER32(?,00001013,?,00000000), ref: 00404FC0
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2972549926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000001.00000002.2972517186.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972577518.0000000000407000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000409000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000413000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000416000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000041F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000046F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972789889.000000000052B000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_400000_Au_.jbxd
                            Similarity
                            • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                            • String ID: Show
                            • API String ID: 1941528284-2453435967
                            • Opcode ID: 6eb49238af6692539912acbcd3088fdc8e4a0dc505d43c590e7d81ca3d5c7019
                            • Instruction ID: 387613274165ae398735932c2abc0a0b51f1de13e66d7cff8d2fd5b5c87d53b9
                            • Opcode Fuzzy Hash: 6eb49238af6692539912acbcd3088fdc8e4a0dc505d43c590e7d81ca3d5c7019
                            • Instruction Fuzzy Hash: BA41E531900515BBCB10BFB5DD46EAF3A79EF02369B20433BF511B11E1D63C5A418AAE
                            APIs
                            • GetTickCount.KERNEL32 ref: 00403058
                              • Part of subcall function 004031F1: SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402E9D,?), ref: 004031FF
                            • SetFilePointer.KERNELBASE(00000000,00000000,?,00000000,?,00402F4E,00000004,00000000,00000000,00000000,?,?,?,00402EC4,000000FF,00000000), ref: 0040308B
                            • WriteFile.KERNELBASE(00413C40,00414463,00000000,00000000,0041BC40,00004000,?,00000000,?,00402F4E,00000004,00000000,00000000,00000000,?,?), ref: 00403145
                            • SetFilePointer.KERNELBASE(00036294,00000000,00000000,0041BC40,00004000,?,00000000,?,00402F4E,00000004,00000000,00000000,00000000,?,?), ref: 00403197
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2972549926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000001.00000002.2972517186.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972577518.0000000000407000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000409000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000413000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000416000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000041F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000046F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972789889.000000000052B000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_400000_Au_.jbxd
                            Similarity
                            • API ID: File$Pointer$CountTickWrite
                            • String ID: @<A$cDA
                            • API String ID: 2146148272-1061399103
                            • Opcode ID: 174d68c61dc59966423a732e2d3c391a81e8efc1f43ef34debc31d603f9fbc71
                            • Instruction ID: 38a819a872193e9674b1f8cae37046a3c02fbcd4fdc241d2fccf286a9b7d6e75
                            • Opcode Fuzzy Hash: 174d68c61dc59966423a732e2d3c391a81e8efc1f43ef34debc31d603f9fbc71
                            • Instruction Fuzzy Hash: A841A0726081019FD710DF29ED409A67FACF748357714427BE800BA2E5EB386E499B9D
                            APIs
                            • GetModuleHandleA.KERNELBASE(00000000,00000001,000000F0), ref: 00401F7C
                            • LoadLibraryExA.KERNELBASE(00000000,?,00000008,00000001,000000F0), ref: 00401F8C
                            • GetProcAddress.KERNEL32(00000000,?), ref: 00401F9C
                            • KiUserCallbackDispatcher.NTDLL(?,00002000,00447000,00413B70, oD,?,00000008,00000001,000000F0), ref: 00401FDE
                              • Part of subcall function 00404F04: lstrlenA.KERNEL32(0042DC78,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C4A,00000000,?), ref: 00404F3D
                              • Part of subcall function 00404F04: lstrlenA.KERNEL32(00402C4A,0042DC78,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C4A,00000000), ref: 00404F4D
                              • Part of subcall function 00404F04: lstrcatA.KERNEL32(0042DC78,00402C4A,00402C4A,0042DC78,00000000,00000000,00000000), ref: 00404F60
                              • Part of subcall function 00404F04: SetWindowTextA.USER32(0042DC78,0042DC78), ref: 00404F72
                              • Part of subcall function 00404F04: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404F98
                              • Part of subcall function 00404F04: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404FB2
                              • Part of subcall function 00404F04: SendMessageA.USER32(?,00001013,?,00000000), ref: 00404FC0
                            • FreeLibrary.KERNEL32(00000000,00000000,000000F7,?,?,00000008,00000001,000000F0), ref: 00402007
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2972549926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000001.00000002.2972517186.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972577518.0000000000407000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000409000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000413000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000416000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000041F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000046F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972789889.000000000052B000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_400000_Au_.jbxd
                            Similarity
                            • API ID: MessageSend$Librarylstrlen$AddressCallbackDispatcherFreeHandleLoadModuleProcTextUserWindowlstrcat
                            • String ID: oD
                            • API String ID: 4236411475-1423469843
                            • Opcode ID: 7e2e23e8ca072dcf6c3c9cb4140efd1df108e626b28cb1cbe2193e254b71bcec
                            • Instruction ID: bdc715ebbed8c2eda9ea234d2d213aec03b0b01e395bd1d50e003243710bed61
                            • Opcode Fuzzy Hash: 7e2e23e8ca072dcf6c3c9cb4140efd1df108e626b28cb1cbe2193e254b71bcec
                            • Instruction Fuzzy Hash: 10212B32D04216ABCF207FA4CE89AAE75B0AB45398F20463BF511B62E1D77C4D41A65E
                            APIs
                            • __EH_prolog3.LIBCMT ref: 6E5AD12D
                            • GetTokenInformation.KERNELBASE(?,00000001(TokenIntegrityLevel),00000000,00000000,?,00000010,6E5A3C83,0000002C,6E5A4CA5,0000005C,6E5A5150), ref: 6E5AD15E
                            • GetTokenInformation.KERNELBASE(?,00000001(TokenIntegrityLevel),00000000,00000000,00000000,?,TokenIntegrityLevel,00000000,00000000,?,00000010,6E5A3C83,0000002C,6E5A4CA5,0000005C,6E5A5150), ref: 6E5AD184
                            • ConvertSidToStringSidA.ADVAPI32(00000000,00000000), ref: 6E5AD198
                            • LocalFree.KERNEL32(00000000,00000000,00000000,?,TokenIntegrityLevel,00000000,00000000,00000000,?,TokenIntegrityLevel,00000000,00000000,?,00000010,6E5A3C83,0000002C), ref: 6E5AD1B5
                            • CloseHandle.KERNEL32(?,?,TokenIntegrityLevel,00000000,00000000,?,00000010,6E5A3C83,0000002C,6E5A4CA5,0000005C,6E5A5150), ref: 6E5AD1C3
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: InformationToken$CloseConvertFreeH_prolog3HandleLocalString
                            • String ID:
                            • API String ID: 3529215428-0
                            • Opcode ID: 7ddafbe476f39b87bf486c02c636d12bc90f644657da5e71c5b1cbe60fefad71
                            • Instruction ID: 5663edff8cc1fb5047139c72295aa87b34d4db116075a43b2b965e7cc90c2384
                            • Opcode Fuzzy Hash: 7ddafbe476f39b87bf486c02c636d12bc90f644657da5e71c5b1cbe60fefad71
                            • Instruction Fuzzy Hash: 43117CB190060A9FDB049FE4CD44ABFBBF9FF89704F10082DF211A2281DB754E448B65
                            APIs
                            • SetFilePointer.KERNELBASE(00409130,00000000,00000000,00000000,00000000,00000000,?,?,?,00402EC4,000000FF,00000000,00000000,00409130,?), ref: 00402F3F
                            • ReadFile.KERNELBASE(00409130,00000004,?,00000000,00000004,00000000,00000000,00000000,?,?,?,00402EC4,000000FF,00000000,00000000,00409130), ref: 00402F6C
                            • ReadFile.KERNELBASE(0041BC40,00004000,?,00000000,00409130,?,00402EC4,000000FF,00000000,00000000,00409130,?), ref: 00402FC6
                            • WriteFile.KERNELBASE(00000000,0041BC40,?,000000FF,00000000,?,00402EC4,000000FF,00000000,00000000,00409130,?), ref: 00402FDE
                            Memory Dump Source
                            • Source File: 00000001.00000002.2972549926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000001.00000002.2972517186.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972577518.0000000000407000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000409000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000413000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000416000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000041F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000046F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972789889.000000000052B000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_400000_Au_.jbxd
                            Similarity
                            • API ID: File$Read$PointerWrite
                            • String ID:
                            • API String ID: 2113905535-0
                            • Opcode ID: 3f7d08bd1b607004b86426ebc4fc7916ae32c0a4dad671b24d0311feea879852
                            • Instruction ID: ec21393f4165ad4c0dee3133c7f646fae2b171c51213e780747c13a8c2f6635b
                            • Opcode Fuzzy Hash: 3f7d08bd1b607004b86426ebc4fc7916ae32c0a4dad671b24d0311feea879852
                            • Instruction Fuzzy Hash: 8A314731501249EBDB21CF55DD44A9E7FBCEB803A5F20403AF904A6194D7749F81EBA9
                            APIs
                              • Part of subcall function 02501D3B: GlobalFree.KERNEL32(?), ref: 02501F80
                              • Part of subcall function 02501D3B: GlobalFree.KERNEL32(?), ref: 02501F85
                              • Part of subcall function 02501D3B: GlobalFree.KERNEL32(?), ref: 02501F8A
                            • GlobalFree.KERNEL32(00000000), ref: 02501A3A
                            • FreeLibrary.KERNEL32(?), ref: 02501AB1
                            • GlobalFree.KERNEL32(00000000), ref: 02501AD6
                              • Part of subcall function 025023F6: GlobalAlloc.KERNEL32(00000040,E8002080), ref: 02502428
                              • Part of subcall function 025027CC: GlobalAlloc.KERNEL32(00000040,00000000,?,?,00000000,?,?,?,?,02501A0B,00000000), ref: 0250281C
                              • Part of subcall function 025018A1: lstrcpyA.KERNEL32(00000000,02504018,00000000,02501967,00000000), ref: 025018BA
                              • Part of subcall function 025025FE: wsprintfA.USER32 ref: 0250265F
                              • Part of subcall function 025025FE: GlobalFree.KERNEL32(?), ref: 02502728
                              • Part of subcall function 025025FE: GlobalFree.KERNEL32(00000000), ref: 02502751
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2973409424.0000000002501000.00000020.00000001.01000000.00000008.sdmp, Offset: 02500000, based on PE: true
                            • Associated: 00000001.00000002.2973389138.0000000002500000.00000002.00000001.01000000.00000008.sdmpDownload File
                            • Associated: 00000001.00000002.2973429594.0000000002503000.00000002.00000001.01000000.00000008.sdmpDownload File
                            • Associated: 00000001.00000002.2973449141.0000000002505000.00000002.00000001.01000000.00000008.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_2500000_Au_.jbxd
                            Similarity
                            • API ID: Global$Free$Alloc$Librarylstrcpywsprintf
                            • String ID:
                            • API String ID: 1767494692-3916222277
                            • Opcode ID: 1ad8a079af9847876a880815de8c8f410f2d89ea35db0fd2328ddd72402ab5c8
                            • Instruction ID: 7d412abded9c2ec60b87e916c3c85600a8744899aea1f9197acdd18d97ca5054
                            • Opcode Fuzzy Hash: 1ad8a079af9847876a880815de8c8f410f2d89ea35db0fd2328ddd72402ab5c8
                            • Instruction Fuzzy Hash: 3031B271400A069ACB14AF75DCD8BA63BA8BF44324F08C865ED0DAE0C6DF748445CBBE
                            APIs
                            • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C0D
                            • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401C25
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2972549926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000001.00000002.2972517186.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972577518.0000000000407000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000409000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000413000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000416000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000041F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000046F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972789889.000000000052B000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_400000_Au_.jbxd
                            Similarity
                            • API ID: MessageSend$Timeout
                            • String ID: !
                            • API String ID: 1777923405-2657877971
                            • Opcode ID: a869fc4ed9d69aa89ddab629416d3bed9472318dc20609659f67b64c2dc426d5
                            • Instruction ID: d701d1914d9a432f1ee94957cc89600c82e7343f4fc37ddb5fc3d32b609c0d77
                            • Opcode Fuzzy Hash: a869fc4ed9d69aa89ddab629416d3bed9472318dc20609659f67b64c2dc426d5
                            • Instruction Fuzzy Hash: D821C4B1A44209BFEF01AFB4CE4AAAE7B75EF44344F14053EF602B60D1D6B84980E718
                            APIs
                            • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 6E5B3195
                              • Part of subcall function 6E5BD5AA: _malloc.LIBCMT ref: 6E5BD5C2
                              • Part of subcall function 6E5B14F5: __EH_prolog3.LIBCMT ref: 6E5B14FC
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: H_prolog3Ios_base_dtor_mallocstd::ios_base::_
                            • String ID: SeBackupPrivilege$SeDebugPrivilege$SeRestorePrivilege
                            • API String ID: 2248311987-2063704729
                            • Opcode ID: 54210688b652a011ed1df1ad24a9730d3dfb93b9d77e44eeebb0b66d39cea8ae
                            • Instruction ID: 8bf0aefc11381e8f312da3da9d83dcb3a0d3a763b63ae2d1b2c0ae71508673e7
                            • Opcode Fuzzy Hash: 54210688b652a011ed1df1ad24a9730d3dfb93b9d77e44eeebb0b66d39cea8ae
                            • Instruction Fuzzy Hash: 3E012832115B15CBD654EBE8C835AAA33ED9BC2625B010519D614AF3C4DF705C4287D3
                            APIs
                            • GetTickCount.KERNEL32 ref: 0040587F
                            • GetTempFileNameA.KERNELBASE(?,0061736E,00000000,?), ref: 00405899
                            Strings
                            • nsa, xrefs: 00405878
                            • "C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exe" , xrefs: 00405873
                            Memory Dump Source
                            • Source File: 00000001.00000002.2972549926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000001.00000002.2972517186.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972577518.0000000000407000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000409000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000413000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000416000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000041F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000046F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972789889.000000000052B000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_400000_Au_.jbxd
                            Similarity
                            • API ID: CountFileNameTempTick
                            • String ID: "C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exe" $nsa
                            • API String ID: 1716503409-920667318
                            • Opcode ID: fc5e126f8815d4696b9f295c06fae67d9d4e63728d0dbdda5093f58b42bfadad
                            • Instruction ID: 7bdb262dbebad2fb51735791196b4a750b565e3ebaa120aaaad2cbe3184e43fd
                            • Opcode Fuzzy Hash: fc5e126f8815d4696b9f295c06fae67d9d4e63728d0dbdda5093f58b42bfadad
                            • Instruction Fuzzy Hash: B1F0A73734820876E7105E55DC04B9B7F9DDF91760F14C027FE44DA1C0D6B49954C7A5
                            APIs
                              • Part of subcall function 004056ED: CharNextA.USER32(0040549F,?,0043BCA8,00000000,00405751,0043BCA8,0043BCA8,?,?,74DF2EE0,0040549F,?,"C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exe" ,74DF2EE0), ref: 004056FB
                              • Part of subcall function 004056ED: CharNextA.USER32(00000000), ref: 00405700
                              • Part of subcall function 004056ED: CharNextA.USER32(00000000), ref: 0040570F
                            • CreateDirectoryA.KERNELBASE(00000000,?,00000000,0000005C,00000000,000000F0), ref: 004015DB
                            • GetLastError.KERNEL32(?,00000000,0000005C,00000000,000000F0), ref: 004015E5
                            • GetFileAttributesA.KERNELBASE(00000000,?,00000000,0000005C,00000000,000000F0), ref: 004015F3
                            • SetCurrentDirectoryA.KERNEL32(00000000,00473000,00000000,00000000,000000F0), ref: 00401622
                            Memory Dump Source
                            • Source File: 00000001.00000002.2972549926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000001.00000002.2972517186.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972577518.0000000000407000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000409000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000413000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000416000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000041F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000046F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972789889.000000000052B000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_400000_Au_.jbxd
                            Similarity
                            • API ID: CharNext$Directory$AttributesCreateCurrentErrorFileLast
                            • String ID:
                            • API String ID: 3751793516-0
                            • Opcode ID: 209af644734a24d1333b26708d9a983e4321cafaa5444aff04a6b4d172326dd5
                            • Instruction ID: 1bea97f6ad753e655b82da7d5523b655d2584313a213d434da7226bf4f447ea8
                            • Opcode Fuzzy Hash: 209af644734a24d1333b26708d9a983e4321cafaa5444aff04a6b4d172326dd5
                            • Instruction Fuzzy Hash: 790108318081419FDB116F751D4497F6BB0AA56369724073FF491B22E2C63C0941962E
                            APIs
                            • __EH_prolog3_GS.LIBCMT ref: 6E5A3C2A
                              • Part of subcall function 6E5AD008: GetCurrentProcessId.KERNEL32(?,?,?,00000000), ref: 6E5AD039
                              • Part of subcall function 6E5AD008: ProcessIdToSessionId.KERNEL32(00000000,?,?,00000000), ref: 6E5AD040
                              • Part of subcall function 6E5AD008: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,?,00000000), ref: 6E5AD049
                              • Part of subcall function 6E5AD008: _memset.LIBCMT ref: 6E5AD05E
                              • Part of subcall function 6E5AD008: Process32First.KERNEL32(00000000,?), ref: 6E5AD078
                              • Part of subcall function 6E5AD008: CloseHandle.KERNEL32(00000000,?,?,00000000), ref: 6E5AD0DF
                              • Part of subcall function 6E5AD008: OpenProcess.KERNEL32(00000400,00000000,00000000,?,?,00000000), ref: 6E5AD0EC
                              • Part of subcall function 6E5AD008: OpenProcessToken.ADVAPI32(00000000,00000008,?,?,?,00000000), ref: 6E5AD101
                              • Part of subcall function 6E5AD008: CloseHandle.KERNEL32(00000000,?,?,00000000), ref: 6E5AD113
                            • GetCurrentProcess.KERNEL32(00000008,6E5A5049,0000002C,6E5A4CA5,0000005C,6E5A5150), ref: 6E5A3C67
                            • OpenProcessToken.ADVAPI32(00000000), ref: 6E5A3C6E
                            • CloseHandle.KERNELBASE(6E5A5049,00000000,0000002C,6E5A4CA5,0000005C,6E5A5150), ref: 6E5A3C96
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: Process$CloseHandleOpen$CurrentToken$CreateFirstH_prolog3_Process32SessionSnapshotToolhelp32_memset
                            • String ID:
                            • API String ID: 3642591257-0
                            • Opcode ID: f4a0d03d32a6401356cdf73562d95d88156a2ee0e45d679743b74a95e2d1d2e6
                            • Instruction ID: 08f0d0e2a382b375937c3575d1c66721305fc3e743d6a143a6e91962e6297a32
                            • Opcode Fuzzy Hash: f4a0d03d32a6401356cdf73562d95d88156a2ee0e45d679743b74a95e2d1d2e6
                            • Instruction Fuzzy Hash: A3012871D11218ABDF10EFE8E994ADDBBF9BF44708F80482DE702A7241DB799908CB55
                            APIs
                            • __EH_prolog3_GS.LIBCMT ref: 6E5ADA3E
                              • Part of subcall function 6E5AD79C: __EH_prolog3_GS.LIBCMT ref: 6E5AD7A6
                              • Part of subcall function 6E5AD79C: RegOpenKeyExA.KERNELBASE(80000003,?,00000000,00000001,?), ref: 6E5AD82B
                              • Part of subcall function 6E5AD79C: _memset.LIBCMT ref: 6E5AD84D
                              • Part of subcall function 6E5AD79C: RegQueryValueExA.KERNELBASE(?,?,00000000,?,?,?,6E5B2085), ref: 6E5AD888
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: H_prolog3_$OpenQueryValue_memset
                            • String ID: AppData$Local AppData
                            • API String ID: 1942963601-163911853
                            • Opcode ID: b5499fa2a9ef3d9eae2aa67e20c414753e97628972aaabe9ffea80ea1a3edaa8
                            • Instruction ID: 395dc676163018afdd69055ba4b282f8f0cf7987e2990f0d8fd1272ed7ac89ad
                            • Opcode Fuzzy Hash: b5499fa2a9ef3d9eae2aa67e20c414753e97628972aaabe9ffea80ea1a3edaa8
                            • Instruction Fuzzy Hash: 8221E7B59001188ACB58EFEDC951AEDB7F9AB98208F508859C609E7241EF349E09CB51
                            Memory Dump Source
                            • Source File: 00000001.00000002.2972549926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000001.00000002.2972517186.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972577518.0000000000407000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000409000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000413000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000416000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000041F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000046F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972789889.000000000052B000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_400000_Au_.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b47bfdafb4299acf6df14b1a265fb959f908a42d38d0bc6d60d6342fbb02c28f
                            • Instruction ID: 319d18918fa2cc3741333e20ed782d5c303dd2f769888eebbc994f2124d7c2e6
                            • Opcode Fuzzy Hash: b47bfdafb4299acf6df14b1a265fb959f908a42d38d0bc6d60d6342fbb02c28f
                            • Instruction Fuzzy Hash: 29A15171E00229CBDF28CFA8C8547ADBBB1FF44305F15812AD856BB281D7789A96DF44
                            Memory Dump Source
                            • Source File: 00000001.00000002.2972549926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000001.00000002.2972517186.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972577518.0000000000407000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000409000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000413000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000416000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000041F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000046F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972789889.000000000052B000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_400000_Au_.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: d0b545a720d06a2780d8eb9310de1c164ea8e259f40aa19cdef3f662a7789f4d
                            • Instruction ID: 868f2ec1f3ea74d7de1394d818727f69d5aca31e92bf34b5737afca42cfaef71
                            • Opcode Fuzzy Hash: d0b545a720d06a2780d8eb9310de1c164ea8e259f40aa19cdef3f662a7789f4d
                            • Instruction Fuzzy Hash: 6E913171D00229CBEF28CF98C8547ADBBB1FF44305F15812AD856BB281C7789A9ADF44
                            Memory Dump Source
                            • Source File: 00000001.00000002.2972549926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000001.00000002.2972517186.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972577518.0000000000407000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000409000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000413000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000416000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000041F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000046F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972789889.000000000052B000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_400000_Au_.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3ca4e82cbd918d9bc6f131d9bc7fd5d61b9600368ad5a57dd77e762cc9babb20
                            • Instruction ID: e06b97397237a54a8f7c6fae7a0c48c933f493286525731b7b3672fa0d973436
                            • Opcode Fuzzy Hash: 3ca4e82cbd918d9bc6f131d9bc7fd5d61b9600368ad5a57dd77e762cc9babb20
                            • Instruction Fuzzy Hash: 678155B1D00229CFDF24CFA8C8447ADBBB1FB44305F25816AD456BB281D7789A96CF54
                            Memory Dump Source
                            • Source File: 00000001.00000002.2972549926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000001.00000002.2972517186.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972577518.0000000000407000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000409000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000413000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000416000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000041F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000046F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972789889.000000000052B000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_400000_Au_.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: c94337aa44be19872a05e7fe324c1f72408cb83bc4afcb37e89916e28dd5cdb7
                            • Instruction ID: 3ccfc7c80e99de65fa6db0e0edc8679980b1d0ea62cd2807200041591328ae3c
                            • Opcode Fuzzy Hash: c94337aa44be19872a05e7fe324c1f72408cb83bc4afcb37e89916e28dd5cdb7
                            • Instruction Fuzzy Hash: D98187B1D00229CBDF24CFA8C8447AEBBB1FB44305F11816AD856BB2C1C7785A96CF44
                            Memory Dump Source
                            • Source File: 00000001.00000002.2972549926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000001.00000002.2972517186.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972577518.0000000000407000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000409000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000413000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000416000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000041F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000046F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972789889.000000000052B000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_400000_Au_.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 040a7e0d789931a885e98904e34fb369bef72c7c312577bd0d6f252efd828c84
                            • Instruction ID: 235c9a1f152390887c8e3346b3cf8cf745e7d176c25095dba4735a56a8f4339d
                            • Opcode Fuzzy Hash: 040a7e0d789931a885e98904e34fb369bef72c7c312577bd0d6f252efd828c84
                            • Instruction Fuzzy Hash: 80714371D00229CBDF28CFA8C8447ADBBF1FB48305F15806AD846BB281D7395A96DF54
                            Memory Dump Source
                            • Source File: 00000001.00000002.2972549926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000001.00000002.2972517186.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972577518.0000000000407000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000409000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000413000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000416000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000041F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000046F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972789889.000000000052B000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_400000_Au_.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 55b1e8378e3b2d282ecc9e99db2cbf184c75cfe722202a43e2005f386b139382
                            • Instruction ID: 067b91939e33353516387f96afd3df60e22fb0a2a23546be1218d687de4ca84d
                            • Opcode Fuzzy Hash: 55b1e8378e3b2d282ecc9e99db2cbf184c75cfe722202a43e2005f386b139382
                            • Instruction Fuzzy Hash: 14715371E00229CFEF28CF98C844BADBBB1FB44305F15816AD816BB281C7799996DF54
                            Memory Dump Source
                            • Source File: 00000001.00000002.2972549926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000001.00000002.2972517186.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972577518.0000000000407000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000409000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000413000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000416000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000041F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000046F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972789889.000000000052B000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_400000_Au_.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: c10b0ec6d8a1716373c4594016b158d4b4e2bf5790cbb1f15a9d43b973b4a336
                            • Instruction ID: fa01dbb36adddbb747bc37ce8d7c8691094d52a97b4972d7f98645f49a39bfe1
                            • Opcode Fuzzy Hash: c10b0ec6d8a1716373c4594016b158d4b4e2bf5790cbb1f15a9d43b973b4a336
                            • Instruction Fuzzy Hash: B3715671D00229CBEF28CF98C844BADBBB1FF44305F11816AD856BB281C7795A56DF54
                            APIs
                            • GlobalFree.KERNEL32(00000000), ref: 00401B75
                            • GlobalAlloc.KERNELBASE(00000040,00002004), ref: 00401B87
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2972549926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000001.00000002.2972517186.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972577518.0000000000407000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000409000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000413000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000416000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000041F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000046F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972789889.000000000052B000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_400000_Au_.jbxd
                            Similarity
                            • API ID: Global$AllocFree
                            • String ID: Show
                            • API String ID: 3394109436-2453435967
                            • Opcode ID: 597160d677e6f6bf239cdb815303b9d1c25e4923f441626bb30c6ad79852b10b
                            • Instruction ID: 40a7280c6bc08be0db3b73016c8de3fef090b0d8f695c6c290b048d12dbd555a
                            • Opcode Fuzzy Hash: 597160d677e6f6bf239cdb815303b9d1c25e4923f441626bb30c6ad79852b10b
                            • Instruction Fuzzy Hash: 3E21C07AA041019BC710AFA4DD84AAE73B8FB44328724463BF502F32D1E77CB9029B5D
                            APIs
                            • __EH_prolog3_GS.LIBCMT ref: 6E5A4BAB
                            • RegQueryInfoKeyA.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 6E5A4BE9
                            • RegEnumKeyExA.KERNELBASE(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 6E5A4C25
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: EnumH_prolog3_InfoQuery
                            • String ID:
                            • API String ID: 4204649834-0
                            • Opcode ID: 4f85e5d2d92d7dc5d1f40d9d406d84dde75477df14fd3bf8951694a59b56a43f
                            • Instruction ID: 3115e09d0ba2c1d41c3360a6c2dd2a494e1cd96eb228b14a5d711579bc95afa1
                            • Opcode Fuzzy Hash: 4f85e5d2d92d7dc5d1f40d9d406d84dde75477df14fd3bf8951694a59b56a43f
                            • Instruction Fuzzy Hash: 2D2130B19012199AEB64DFA9CD95BEEF6FCAF48700F104099A309E3240DB709E858F65
                            APIs
                            • RegOpenKeyExA.KERNELBASE(80000002,00405C89,00000000,00000002,?,00000002,?,?,00405C89,80000002,Software\Microsoft\Windows\CurrentVersion,?,Show,?), ref: 00405A76
                            • RegQueryValueExA.KERNELBASE(?,?,00000000,00405C89,?,00405C89), ref: 00405A97
                            • RegCloseKey.ADVAPI32(?), ref: 00405AB8
                            Memory Dump Source
                            • Source File: 00000001.00000002.2972549926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000001.00000002.2972517186.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972577518.0000000000407000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000409000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000413000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000416000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000041F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000046F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972789889.000000000052B000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_400000_Au_.jbxd
                            Similarity
                            • API ID: CloseOpenQueryValue
                            • String ID:
                            • API String ID: 3677997916-0
                            • Opcode ID: 204e51b4f78c19129b196cb9eb6bb79bd101332c81dc485206331a565e676d9f
                            • Instruction ID: 06a431e2f71295f3cf74ce3459a4c9929c263c6d1c003fd68c505121db66fcab
                            • Opcode Fuzzy Hash: 204e51b4f78c19129b196cb9eb6bb79bd101332c81dc485206331a565e676d9f
                            • Instruction Fuzzy Hash: AB015A7114120AEFDB228F64EC88AEB3FACEF14394B004536F845D6120D335D964DFA5
                            APIs
                            • GetModuleHandleA.KERNEL32(?,?,00000000,0040327F,00000008), ref: 00405E9A
                            • LoadLibraryA.KERNELBASE(?,?,00000000,0040327F,00000008), ref: 00405EA5
                            • GetProcAddress.KERNEL32(00000000,?), ref: 00405EB6
                            Memory Dump Source
                            • Source File: 00000001.00000002.2972549926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000001.00000002.2972517186.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972577518.0000000000407000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000409000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000413000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000416000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000041F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000046F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972789889.000000000052B000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_400000_Au_.jbxd
                            Similarity
                            • API ID: AddressHandleLibraryLoadModuleProc
                            • String ID:
                            • API String ID: 310444273-0
                            • Opcode ID: cda0668070076e7cac62d6abfc32be1e4fdfe709f191786036c768239460f4b3
                            • Instruction ID: 91087f9554edebef2dfdad95906e97f440013226b38390424b9c6ad62026e406
                            • Opcode Fuzzy Hash: cda0668070076e7cac62d6abfc32be1e4fdfe709f191786036c768239460f4b3
                            • Instruction Fuzzy Hash: 0FE08C32A08511BBD3115B30ED0896B77A8EA89B41304083EF959F6290D734EC119BFA
                            APIs
                            Memory Dump Source
                            • Source File: 00000001.00000002.2973409424.0000000002501000.00000020.00000001.01000000.00000008.sdmp, Offset: 02500000, based on PE: true
                            • Associated: 00000001.00000002.2973389138.0000000002500000.00000002.00000001.01000000.00000008.sdmpDownload File
                            • Associated: 00000001.00000002.2973429594.0000000002503000.00000002.00000001.01000000.00000008.sdmpDownload File
                            • Associated: 00000001.00000002.2973449141.0000000002505000.00000002.00000001.01000000.00000008.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_2500000_Au_.jbxd
                            Similarity
                            • API ID: ErrorImageLastLoad
                            • String ID:
                            • API String ID: 2189606529-0
                            • Opcode ID: 283fbd6495544bb8067e48c2dc8201a665fd3f218e3d3bd90195c19143ab8206
                            • Instruction ID: 23e0445fbd10fd6e0c4458adf797dd9fd7311219e7a135b3f029cd36316fddaf
                            • Opcode Fuzzy Hash: 283fbd6495544bb8067e48c2dc8201a665fd3f218e3d3bd90195c19143ab8206
                            • Instruction Fuzzy Hash: 06516DB2D006059BDB20EFA4ECD5BA97B65FB84354F208C2ADA08EB284D7349494DF5D
                            APIs
                              • Part of subcall function 00405B66: lstrcpynA.KERNEL32(?,?,00002000,004032AA,00442EA0,NSIS Error), ref: 00405B73
                              • Part of subcall function 004056ED: CharNextA.USER32(0040549F,?,0043BCA8,00000000,00405751,0043BCA8,0043BCA8,?,?,74DF2EE0,0040549F,?,"C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exe" ,74DF2EE0), ref: 004056FB
                              • Part of subcall function 004056ED: CharNextA.USER32(00000000), ref: 00405700
                              • Part of subcall function 004056ED: CharNextA.USER32(00000000), ref: 0040570F
                            • lstrlenA.KERNEL32(0043BCA8,00000000,0043BCA8,0043BCA8,?,?,74DF2EE0,0040549F,?,"C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exe" ,74DF2EE0), ref: 0040578D
                            • GetFileAttributesA.KERNELBASE(0043BCA8,0043BCA8,0043BCA8,0043BCA8,0043BCA8,0043BCA8,00000000,0043BCA8,0043BCA8,?,?,74DF2EE0,0040549F,?,"C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exe" ,74DF2EE0), ref: 0040579D
                            Memory Dump Source
                            • Source File: 00000001.00000002.2972549926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000001.00000002.2972517186.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972577518.0000000000407000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000409000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000413000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000416000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000041F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000046F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972789889.000000000052B000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_400000_Au_.jbxd
                            Similarity
                            • API ID: CharNext$AttributesFilelstrcpynlstrlen
                            • String ID:
                            • API String ID: 3248276644-0
                            • Opcode ID: bbf9c2a4c7a9848b14ccf845bd5e395f523b7c3fb69d62b914034bef7f348fd8
                            • Instruction ID: 0812166c8b496666587ca5d03f38fde26ec08608c69b0591fb7618eaa3d9f744
                            • Opcode Fuzzy Hash: bbf9c2a4c7a9848b14ccf845bd5e395f523b7c3fb69d62b914034bef7f348fd8
                            • Instruction Fuzzy Hash: C9F0C225105D509AC726373A5C09EAF1A55CE873A4F180A3FF894B32D1DB3C8943EDAE
                            APIs
                            • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                            • SendMessageA.USER32(?,00000402,00000000), ref: 004013F4
                            Memory Dump Source
                            • Source File: 00000001.00000002.2972549926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000001.00000002.2972517186.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972577518.0000000000407000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000409000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000413000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000416000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000041F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000046F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972789889.000000000052B000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_400000_Au_.jbxd
                            Similarity
                            • API ID: MessageSend
                            • String ID:
                            • API String ID: 3850602802-0
                            • Opcode ID: 4867a7ac09fc69c5be383e70d71a49da0db6d857fdd3f63813c45ff4234f607f
                            • Instruction ID: 260ece8b11c67a0547d38148548bb69d3a72b9e094467d57d573f0264d123cd5
                            • Opcode Fuzzy Hash: 4867a7ac09fc69c5be383e70d71a49da0db6d857fdd3f63813c45ff4234f607f
                            • Instruction Fuzzy Hash: EF0128316242219BE7195B399E04B2A36D9E712314F24423FF855F72F1D6B8DC02DB4D
                            APIs
                            • SendMessageA.USER32(?,0000000B,?), ref: 00402875
                            • InvalidateRect.USER32(?), ref: 00402885
                            Memory Dump Source
                            • Source File: 00000001.00000002.2972549926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000001.00000002.2972517186.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972577518.0000000000407000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000409000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000413000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000416000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000041F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000046F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972789889.000000000052B000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_400000_Au_.jbxd
                            Similarity
                            • API ID: InvalidateMessageRectSend
                            • String ID:
                            • API String ID: 909852535-0
                            • Opcode ID: fe5d62905ff904b06b667de19638afdd23f1a4194226e5edc5a3f72ad26ed6dd
                            • Instruction ID: 24f90174686c9b3cd20c076e36aa4b559fc68d02f4454c5cfe24fb6f4ce72024
                            • Opcode Fuzzy Hash: fe5d62905ff904b06b667de19638afdd23f1a4194226e5edc5a3f72ad26ed6dd
                            • Instruction Fuzzy Hash: CBE08C72A00104AFDB00DB94FE859AEBBBAEB40359B10007AF201F00A0D2711D00CA28
                            APIs
                            • ShowWindow.USER32(00000000,00000000,00000001), ref: 00401DAB
                            • EnableWindow.USER32(00000000,00000000), ref: 00401DB6
                            Memory Dump Source
                            • Source File: 00000001.00000002.2972549926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000001.00000002.2972517186.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972577518.0000000000407000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000409000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000413000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000416000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000041F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000046F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972789889.000000000052B000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_400000_Au_.jbxd
                            Similarity
                            • API ID: Window$EnableShow
                            • String ID:
                            • API String ID: 1136574915-0
                            • Opcode ID: 1a4ba173b2ab926010c6fd7e079550169295c22d01dc646cb7fa1dd7a7391512
                            • Instruction ID: 61dcf640407b65e998d28dbe3df77c1067fac425532fadd3a93478c567a596b8
                            • Opcode Fuzzy Hash: 1a4ba173b2ab926010c6fd7e079550169295c22d01dc646cb7fa1dd7a7391512
                            • Instruction Fuzzy Hash: 63E0C276A08210DBD710FBB4AE899AE7664DB413A9B10453BF503F20C1D2B89C8096EE
                            APIs
                            • GetFileAttributesA.KERNELBASE(00000003,00402CB5,0047D000,80000000,00000003), ref: 00405841
                            • CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405863
                            Memory Dump Source
                            • Source File: 00000001.00000002.2972549926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000001.00000002.2972517186.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972577518.0000000000407000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000409000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000413000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000416000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000041F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000046F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972789889.000000000052B000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_400000_Au_.jbxd
                            Similarity
                            • API ID: File$AttributesCreate
                            • String ID:
                            • API String ID: 415043291-0
                            • Opcode ID: 6d56aff3fab625e069b8f0f4beb3d6c68df7a2746e2dd21b0a72e0224e52029a
                            • Instruction ID: 90a47e22fdd321f70bf06df01bfdefa11f3e73682391c7296034eb3a8fe04f39
                            • Opcode Fuzzy Hash: 6d56aff3fab625e069b8f0f4beb3d6c68df7a2746e2dd21b0a72e0224e52029a
                            • Instruction Fuzzy Hash: 8CD09E31658301AFEF098F20DD1AF2E7AA2EB84B00F10562CB646940E0D6715815DB16
                            APIs
                            • GetFileAttributesA.KERNELBASE(?,00405629,?,?,?), ref: 00405822
                            • SetFileAttributesA.KERNELBASE(?,00000000), ref: 00405834
                            Memory Dump Source
                            • Source File: 00000001.00000002.2972549926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000001.00000002.2972517186.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972577518.0000000000407000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000409000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000413000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000416000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000041F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000046F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972789889.000000000052B000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_400000_Au_.jbxd
                            Similarity
                            • API ID: AttributesFile
                            • String ID:
                            • API String ID: 3188754299-0
                            • Opcode ID: 499c41a265c8c72c251eb99c81a2d8ea197c0ca55525d81af5d9f53b6a62e1c9
                            • Instruction ID: 89544605ef234ac14ed66c3b065a2d642d1346908a696065e0ba681aeed38476
                            • Opcode Fuzzy Hash: 499c41a265c8c72c251eb99c81a2d8ea197c0ca55525d81af5d9f53b6a62e1c9
                            • Instruction Fuzzy Hash: F8C04CB1808501ABD7056B24EF0D81F7B66EF50325B108B35F5A9E00F0C7355C66DA1A
                            APIs
                            • lstrcpynA.KERNEL32(06D91054,?,?,?,06D91054,?), ref: 06D91E06
                            • GlobalFree.KERNELBASE ref: 06D91E16
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976302121.0000000006D91000.00000020.00000001.01000000.00000009.sdmp, Offset: 06D90000, based on PE: true
                            • Associated: 00000001.00000002.2976276508.0000000006D90000.00000002.00000001.01000000.00000009.sdmpDownload File
                            • Associated: 00000001.00000002.2976439780.0000000006D93000.00000002.00000001.01000000.00000009.sdmpDownload File
                            • Associated: 00000001.00000002.2976488802.0000000006D94000.00000008.00000001.01000000.00000009.sdmpDownload File
                            • Associated: 00000001.00000002.2976529163.0000000006D97000.00000002.00000001.01000000.00000009.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6d90000_Au_.jbxd
                            Similarity
                            • API ID: FreeGloballstrcpyn
                            • String ID:
                            • API String ID: 1459762280-0
                            • Opcode ID: eb2d6a14ab28a1cc0a0b691d1d260b2340328e4fa96d85d9886e24a2e3cb529f
                            • Instruction ID: f7a6da1bf8b53d353f55f66357d74b2ce0848a546a4a593a2f03360d3503af66
                            • Opcode Fuzzy Hash: eb2d6a14ab28a1cc0a0b691d1d260b2340328e4fa96d85d9886e24a2e3cb529f
                            • Instruction Fuzzy Hash: BFF01532A15212DFDBA2CF25EC54A6777EABF48784B158829F986C7350D330E814CBB0
                            APIs
                            • ReadFile.KERNELBASE(00409130,00000000,00000000,00000000,0041BC40,00413C40,004030C4,0041BC40,00004000,?,00000000,?,00402F4E,00000004,00000000,00000000), ref: 004031D6
                            Memory Dump Source
                            • Source File: 00000001.00000002.2972549926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000001.00000002.2972517186.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972577518.0000000000407000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000409000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000413000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000416000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000041F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000046F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972789889.000000000052B000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_400000_Au_.jbxd
                            Similarity
                            • API ID: FileRead
                            • String ID:
                            • API String ID: 2738559852-0
                            • Opcode ID: 728267699a9b44ddad9e6e694247195ab13049bac6004c2e56fc09e99b3f0f19
                            • Instruction ID: 4c5c04567c480c11bae84e94003d2882b37cb3083c3cc1db03504fe221b835f3
                            • Opcode Fuzzy Hash: 728267699a9b44ddad9e6e694247195ab13049bac6004c2e56fc09e99b3f0f19
                            • Instruction Fuzzy Hash: DAE08631500119BBCF215E619C00A973B5CEB09362F008033FA04E9190D532DB109BA5
                            APIs
                              • Part of subcall function 00405DC8: CharNextA.USER32(?,*?|<>/":,00000000,00479000,"C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exe" ,00479000,00000000,00403214,00479000,00000000,00403386), ref: 00405E20
                              • Part of subcall function 00405DC8: CharNextA.USER32(?,?,?,00000000), ref: 00405E2D
                              • Part of subcall function 00405DC8: CharNextA.USER32(?,00479000,"C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exe" ,00479000,00000000,00403214,00479000,00000000,00403386), ref: 00405E32
                              • Part of subcall function 00405DC8: CharPrevA.USER32(?,?,"C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exe" ,00479000,00000000,00403214,00479000,00000000,00403386), ref: 00405E42
                            • CreateDirectoryA.KERNELBASE(00479000,00000000,00479000,00479000,00479000,00000000,00403386), ref: 00403229
                            Memory Dump Source
                            • Source File: 00000001.00000002.2972549926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000001.00000002.2972517186.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972577518.0000000000407000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000409000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000413000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000416000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000041F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000046F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972789889.000000000052B000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_400000_Au_.jbxd
                            Similarity
                            • API ID: Char$Next$CreateDirectoryPrev
                            • String ID:
                            • API String ID: 4115351271-0
                            • Opcode ID: 11ac191fccc5bbc9840a496eb92e8966bc42d1118a3597eec2c2256fb95cb988
                            • Instruction ID: be85e933f5554b091e9989970333af42224d3bace8f0b1f193a31a6a85193b6d
                            • Opcode Fuzzy Hash: 11ac191fccc5bbc9840a496eb92e8966bc42d1118a3597eec2c2256fb95cb988
                            • Instruction Fuzzy Hash: A0D0C92255AE3031C652323A3C06FDF092C9F1272AF55887BF908B40D54B6C1E4289EE
                            APIs
                            • VirtualProtect.KERNELBASE(0250404C,00000004,00000040,0250403C), ref: 0250294E
                            Memory Dump Source
                            • Source File: 00000001.00000002.2973409424.0000000002501000.00000020.00000001.01000000.00000008.sdmp, Offset: 02500000, based on PE: true
                            • Associated: 00000001.00000002.2973389138.0000000002500000.00000002.00000001.01000000.00000008.sdmpDownload File
                            • Associated: 00000001.00000002.2973429594.0000000002503000.00000002.00000001.01000000.00000008.sdmpDownload File
                            • Associated: 00000001.00000002.2973449141.0000000002505000.00000002.00000001.01000000.00000008.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_2500000_Au_.jbxd
                            Similarity
                            • API ID: ProtectVirtual
                            • String ID:
                            • API String ID: 544645111-0
                            • Opcode ID: f37c672921ec2c3d57da210c593d7d55d70a988a17ac0fcb4b647c61cf545c8a
                            • Instruction ID: 54200ce162f973dd73a793272abab6f0af911a43fbbc082fbea0b456ee0607d9
                            • Opcode Fuzzy Hash: f37c672921ec2c3d57da210c593d7d55d70a988a17ac0fcb4b647c61cf545c8a
                            • Instruction Fuzzy Hash: A2E0A5B1D85340DEE360DF68ACE5F213FE4B394745B018C2AE748FA289E3744068AB19
                            APIs
                            • SetDlgItemTextA.USER32(?,?,00000000), ref: 00403F32
                            Memory Dump Source
                            • Source File: 00000001.00000002.2972549926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000001.00000002.2972517186.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972577518.0000000000407000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000409000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000413000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000416000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000041F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000046F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972789889.000000000052B000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_400000_Au_.jbxd
                            Similarity
                            • API ID: ItemText
                            • String ID:
                            • API String ID: 3367045223-0
                            • Opcode ID: a4344885837872da06a0b73f422c0a40da7d5145ed9eee0f172373294b1062d3
                            • Instruction ID: 32956ba5a052c000d200729fffd4f2c944d874cb1110b62223aa4bdd109d9e57
                            • Opcode Fuzzy Hash: a4344885837872da06a0b73f422c0a40da7d5145ed9eee0f172373294b1062d3
                            • Instruction Fuzzy Hash: E4C08C31048200BFD241AB04CC42F1FB3A8EFA0327F00C92EB05CE00D2C634D420CE2A
                            APIs
                            • SendMessageA.USER32(00000028,?,00000001,00403D7E), ref: 00403F5B
                            Memory Dump Source
                            • Source File: 00000001.00000002.2972549926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000001.00000002.2972517186.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972577518.0000000000407000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000409000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000413000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000416000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000041F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000046F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972789889.000000000052B000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_400000_Au_.jbxd
                            Similarity
                            • API ID: MessageSend
                            • String ID:
                            • API String ID: 3850602802-0
                            • Opcode ID: 12ae83ab391e7f369246a6127affb34c56c806e6816565e8b22517892e1e56d9
                            • Instruction ID: 67ca0023b821b57991502e48ebf3819f4b95a9644f5fb617973bfda0dd74b738
                            • Opcode Fuzzy Hash: 12ae83ab391e7f369246a6127affb34c56c806e6816565e8b22517892e1e56d9
                            • Instruction Fuzzy Hash: 0AB0127E6C5201BFDF115B10DE09F467EA2E765701F018074B304240F0C7F200A1DB0A
                            APIs
                            • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402E9D,?), ref: 004031FF
                            Memory Dump Source
                            • Source File: 00000001.00000002.2972549926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000001.00000002.2972517186.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972577518.0000000000407000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000409000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000413000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000416000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000041F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000046F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972789889.000000000052B000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_400000_Au_.jbxd
                            Similarity
                            • API ID: FilePointer
                            • String ID:
                            • API String ID: 973152223-0
                            • Opcode ID: 2028dafccfaa88a297be93e7ba1f52e009ec02dcd94d5fd44c1761bf2bffe23e
                            • Instruction ID: eafd0aff1283cdec3023edec91852d87283cefa69c9b21bce59c6677f93a42a7
                            • Opcode Fuzzy Hash: 2028dafccfaa88a297be93e7ba1f52e009ec02dcd94d5fd44c1761bf2bffe23e
                            • Instruction Fuzzy Hash: 14B01271644200BFDB214F00DF06F057B21A790701F108030B344380F082712420EB1E
                            APIs
                            • GlobalAlloc.KERNELBASE(00000040,02501577,?,?,02501804,?,02501017), ref: 02501549
                            Memory Dump Source
                            • Source File: 00000001.00000002.2973409424.0000000002501000.00000020.00000001.01000000.00000008.sdmp, Offset: 02500000, based on PE: true
                            • Associated: 00000001.00000002.2973389138.0000000002500000.00000002.00000001.01000000.00000008.sdmpDownload File
                            • Associated: 00000001.00000002.2973429594.0000000002503000.00000002.00000001.01000000.00000008.sdmpDownload File
                            • Associated: 00000001.00000002.2973449141.0000000002505000.00000002.00000001.01000000.00000008.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_2500000_Au_.jbxd
                            Similarity
                            • API ID: AllocGlobal
                            • String ID:
                            • API String ID: 3761449716-0
                            • Opcode ID: 8317b1501e94243feb8c4e4801db4455bc10d5016c7f80d0279bc465d5597396
                            • Instruction ID: 1ed5e072de67feb1c51877864b679c722c08404086633ca3ce2f4a8d4ae3428f
                            • Opcode Fuzzy Hash: 8317b1501e94243feb8c4e4801db4455bc10d5016c7f80d0279bc465d5597396
                            • Instruction Fuzzy Hash: C7A00172D81180AADE416E90ADAAF653A21A744701F114880A7196909896650078AA19
                            APIs
                            • GetWindowLongA.USER32(?,000000EB), ref: 1000153B
                            • lstrlenA.KERNEL32(?), ref: 100015D6
                            • lstrlenA.KERNEL32(?), ref: 100015DE
                            • GlobalAlloc.KERNEL32(00000040,?), ref: 100015F9
                            • wsprintfA.USER32 ref: 10001635
                            • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?), ref: 10001671
                            • GetLastError.KERNEL32 ref: 10001682
                              • Part of subcall function 10001438: GetDlgItem.USER32(?,00000001), ref: 10001477
                              • Part of subcall function 10001438: EnableWindow.USER32(00000000), ref: 1000147A
                            • MultiByteToWideChar.KERNEL32(00000003,00000000,?,000000FF,?,00FFFFFF), ref: 100016A7
                            • lstrlenA.KERNEL32(?), ref: 100016B7
                            • MultiByteToWideChar.KERNEL32(00000003,00000000,?,000000FF,00000002,00FFFFFF), ref: 100016DB
                            • GetDlgItem.USER32(?,000003EC), ref: 100016F9
                            • SendMessageW.USER32(00000000), ref: 10001702
                            • GetDlgItem.USER32(?,000003ED), ref: 1000171A
                            • SendMessageW.USER32(00000000), ref: 1000171D
                            • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000001,00000000,?,00000000,00000000,00000000,00000044,?), ref: 10001771
                            • GetLastError.KERNEL32 ref: 10001785
                            • FormatMessageA.KERNEL32(00001300,00000000,00000000,00000400,?,00000000,00000000,00000000), ref: 100017BA
                            • MessageBoxA.USER32(?,?,00000000,00000030), ref: 100017D2
                            • LocalFree.KERNEL32(?), ref: 100017DB
                            • GetLastError.KERNEL32 ref: 100017E3
                            • GlobalFree.KERNEL32(?), ref: 100017EF
                            • CloseHandle.KERNEL32(?), ref: 100017F8
                            • EndDialog.USER32(?,-00000001), ref: 1000181C
                            • SetWindowLongA.USER32(?,000000EB,?), ref: 10001841
                            • GetDlgItem.USER32(?,000003EC), ref: 10001860
                            • SendMessageA.USER32(00000000), ref: 10001869
                            • GetDlgItem.USER32(?,000003ED), ref: 1000187E
                            • SendMessageA.USER32(00000000), ref: 10001881
                            • LoadLibraryA.KERNEL32(SHELL32), ref: 10001888
                            • LoadImageA.USER32(00000000,000000C2,00000001,00000020,00000020,00008000), ref: 1000189F
                            • GetDlgItem.USER32(?,000003EA), ref: 100018B4
                            • SendMessageA.USER32(00000000), ref: 100018B7
                            • SendMessageA.USER32(?,0000000C,00000000), ref: 100018C5
                            • GetDlgItem.USER32(?,000003EB), ref: 100018D8
                            • SendMessageA.USER32(00000000), ref: 100018DB
                            • GetDlgItem.USER32(?,000003E9), ref: 100018FC
                            • SendMessageA.USER32(00000000), ref: 100018FF
                            • DestroyWindow.USER32(?), ref: 1000191B
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976574315.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                            • Associated: 00000001.00000002.2976553438.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000001.00000002.2976597083.0000000010004000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000001.00000002.2976619836.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_10000000_Au_.jbxd
                            Similarity
                            • API ID: Message$ItemSend$Window$ErrorLastlstrlen$ByteCharCreateFreeGlobalLoadLongMultiProcessWide$AllocCloseDestroyDialogEnableFormatHandleImageLibraryLocalLogonWithwsprintf
                            • String ID: %s%s%s$D$SHELL32
                            • API String ID: 1952459550-1920488832
                            • Opcode ID: 34574b97fe99c8b919390515d22d94bd774024d7b160c7d6c717a4e01c56865c
                            • Instruction ID: 1d93073d208240e81b43fb16ae61215ed39919340965964d5039d90bf4136bbf
                            • Opcode Fuzzy Hash: 34574b97fe99c8b919390515d22d94bd774024d7b160c7d6c717a4e01c56865c
                            • Instruction Fuzzy Hash: C3C17C71500259BFFB11DFA0CC84EEE7BBAEB487D0F114125FA05AB1A8DA719E41DB60
                            APIs
                            • GetDlgItem.USER32(?,000003F9), ref: 0040486A
                            • GetDlgItem.USER32(?,00000408), ref: 00404877
                            • GlobalAlloc.KERNEL32(00000040,?), ref: 004048C3
                            • LoadBitmapA.USER32(0000006E), ref: 004048D6
                            • SetWindowLongA.USER32(?,000000FC,00404E54), ref: 004048F0
                            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404904
                            • ImageList_AddMasked.COMCTL32(00000000,?,00FF00FF), ref: 00404918
                            • SendMessageA.USER32(?,00001109,00000002), ref: 0040492D
                            • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404939
                            • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 0040494B
                            • DeleteObject.GDI32(?), ref: 00404950
                            • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 0040497B
                            • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404987
                            • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404A1C
                            • SendMessageA.USER32(?,0000110A,00000003,00000000), ref: 00404A47
                            • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404A5B
                            • GetWindowLongA.USER32(?,000000F0), ref: 00404A8A
                            • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00404A98
                            • ShowWindow.USER32(?,00000005), ref: 00404AA9
                            • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404BAC
                            • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404C11
                            • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00404C26
                            • SendMessageA.USER32(?,00000420,00000000,00000020), ref: 00404C4A
                            • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404C70
                            • ImageList_Destroy.COMCTL32(?), ref: 00404C85
                            • GlobalFree.KERNEL32(?), ref: 00404C95
                            • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00404D05
                            • SendMessageA.USER32(?,00001102,00000410,?), ref: 00404DAE
                            • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 00404DBD
                            • InvalidateRect.USER32(?,00000000,00000001), ref: 00404DDD
                            • ShowWindow.USER32(?,00000000), ref: 00404E2B
                            • GetDlgItem.USER32(?,000003FE), ref: 00404E36
                            • ShowWindow.USER32(00000000), ref: 00404E3D
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2972549926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000001.00000002.2972517186.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972577518.0000000000407000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000409000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000413000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000416000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000041F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000046F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972789889.000000000052B000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_400000_Au_.jbxd
                            Similarity
                            • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                            • String ID: $M$N
                            • API String ID: 1638840714-813528018
                            • Opcode ID: dd0d6839c3c6646c8d4c621fd332aa66db5d69425e8e435e4a889b0b6d183c2e
                            • Instruction ID: 1183d6f7a9f832480c2a2c99bd38156e4ec5938e1fe9ffba5ec1c0e4999ab2b0
                            • Opcode Fuzzy Hash: dd0d6839c3c6646c8d4c621fd332aa66db5d69425e8e435e4a889b0b6d183c2e
                            • Instruction Fuzzy Hash: 8A029CB0D00209AFEB11CF65DD45AAE7BB5FB85314F10817AF610BA2E1C7B99A41CF58
                            APIs
                            • GetModuleFileNameA.KERNEL32(10000000,?,00000208,00000000), ref: 100012CF
                            • lstrcatA.KERNEL32(?,lng,75C08FB0,75BF3EB0), ref: 100012F5
                              • Part of subcall function 10001247: GetPrivateProfileStringA.KERNEL32(MyRunAsStrings,000000FF,00000000,?,00000208,?), ref: 10001269
                              • Part of subcall function 10001247: SendMessageA.USER32(00000000), ref: 100012A9
                              • Part of subcall function 10001247: GetDlgItem.USER32(?,000000FF), ref: 100012A2
                            • GetDlgItem.USER32(?,000003E8), ref: 100013B8
                            • GetPrivateProfileIntA.KERNEL32(MyRunAsCfg,DisableCurrUserOpt,00000000,?), ref: 100013DA
                            • EnableWindow.USER32(?,00000000), ref: 100013E4
                            • GetPrivateProfileIntA.KERNEL32(MyRunAsCfg,HideCurrUserOpt,00000000,?), ref: 100013F8
                            • ShowWindow.USER32(?,00000000), ref: 10001404
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976574315.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                            • Associated: 00000001.00000002.2976553438.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000001.00000002.2976597083.0000000010004000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000001.00000002.2976619836.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_10000000_Au_.jbxd
                            Similarity
                            • API ID: PrivateProfile$ItemWindow$EnableFileMessageModuleNameSendShowStringlstrcat
                            • String ID: Cancel$DisableCurrUserOpt$DlgTitle$HelpText$HideCurrUserOpt$MyRunAsCfg$OptCurrUser$OptOtherUser$Pwd$Username$lng
                            • API String ID: 1739871576-1606624064
                            • Opcode ID: c67b67cf6b72c09f04141cf3aac40c1a9f776453504d2503a71c961c2ab33eb0
                            • Instruction ID: 5a0fd6d5bb8fd049567e080151ef1adc3634c16aa54309ef99e1a2fef023288f
                            • Opcode Fuzzy Hash: c67b67cf6b72c09f04141cf3aac40c1a9f776453504d2503a71c961c2ab33eb0
                            • Instruction Fuzzy Hash: 5A3170B94002187FF711D791CC89EFB7A7CDB966C0F010155F654E209ADF20AE808A71
                            APIs
                              • Part of subcall function 6E5C9287: __getptd_noexit.LIBCMT ref: 6E5C9288
                              • Part of subcall function 6E5C9287: __amsg_exit.LIBCMT ref: 6E5C9295
                            • _memset.LIBCMT ref: 6E5D22F6
                            • _TranslateName.LIBCMT ref: 6E5D2341
                            • _TranslateName.LIBCMT ref: 6E5D238C
                            • GetUserDefaultLCID.KERNEL32(?,?,00000055), ref: 6E5D23D9
                              • Part of subcall function 6E5C53F2: _GetTableIndexFromLcid.LIBCMT ref: 6E5C541F
                              • Part of subcall function 6E5C53F2: _wcsnlen.LIBCMT ref: 6E5C5433
                            • IsValidCodePage.KERNEL32(00000000), ref: 6E5D242D
                            • IsValidLocale.KERNEL32(?,00000001), ref: 6E5D2440
                            • GetLocaleInfoW.KERNEL32(?,00001001,?,00000040), ref: 6E5D2493
                            • GetLocaleInfoW.KERNEL32(?,00001002,?,00000040), ref: 6E5D24AA
                            • __itow_s.LIBCMT ref: 6E5D24BC
                              • Part of subcall function 6E5D484F: _xtow_s@20.LIBCMT ref: 6E5D4871
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: Locale$InfoNameTranslateValid$CodeDefaultFromIndexLcidPageTableUser__amsg_exit__getptd_noexit__itow_s_memset_wcsnlen_xtow_s@20
                            • String ID: D^nU
                            • API String ID: 2025796856-526791073
                            • Opcode ID: a1dd878d5842217aefdb2ebc2e17948d8c64826913ef5d8e77faf28a0f2daad7
                            • Instruction ID: 28bfcc56a8743120fd5b1027e5d4428f9d5085c997ad9086bfeeb0e86ac4e41c
                            • Opcode Fuzzy Hash: a1dd878d5842217aefdb2ebc2e17948d8c64826913ef5d8e77faf28a0f2daad7
                            • Instruction Fuzzy Hash: BE51607590021AEBEB41DFECCC90AFE77ECEF05704F00496AE955DB184EB7099488B69
                            APIs
                            • GetUserNameA.ADVAPI32(00000000,?), ref: 100011A9
                            • wsprintfA.USER32 ref: 100011D8
                            • GetDlgItem.USER32(?,000003E8), ref: 100011FA
                            • SendMessageA.USER32(00000000), ref: 10001203
                            • LoadLibraryA.KERNEL32(SHELL32,00005503,00000000,00000204), ref: 10001217
                            • LoadStringA.USER32(00000000), ref: 1000121E
                            • GetDlgItem.USER32(?,000003EC), ref: 1000123B
                            • SendMessageA.USER32(00000000), ref: 1000123E
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976574315.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                            • Associated: 00000001.00000002.2976553438.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000001.00000002.2976597083.0000000010004000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000001.00000002.2976619836.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_10000000_Au_.jbxd
                            Similarity
                            • API ID: ItemLoadMessageSend$LibraryNameStringUserwsprintf
                            • String ID: SHELL32
                            • API String ID: 970484078-1756878077
                            • Opcode ID: 57a7222d8989f161ee214d83118e8bd9a4413ca5da9ba2a1efdb7cf0cd9ecf79
                            • Instruction ID: 647adecb5b77344e9641148cbd41eb027d92ab1218214b8878e9f8efa4f0453c
                            • Opcode Fuzzy Hash: 57a7222d8989f161ee214d83118e8bd9a4413ca5da9ba2a1efdb7cf0cd9ecf79
                            • Instruction Fuzzy Hash: 03214CB1900268ABFB11EB90CC89FDF7BBCEB04785F004195F754E61A6DB709E848B64
                            APIs
                            • _wcscmp.LIBCMT ref: 6E5D21C2
                            • _wcscmp.LIBCMT ref: 6E5D21D3
                            • GetLocaleInfoW.KERNEL32(?,2000000B,?,00000002,?,?,6E5D2405,?,00000000), ref: 6E5D21EF
                            • GetLocaleInfoW.KERNEL32(?,20001004,?,00000002,?,?,6E5D2405,?,00000000), ref: 6E5D2219
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: InfoLocale_wcscmp
                            • String ID: ACP$OCP
                            • API String ID: 1351282208-711371036
                            • Opcode ID: 594b6fa9ee56981ed078ffaf1ba668886877028615b6167003ea8e1d6af961d6
                            • Instruction ID: d20fa96184b3dc99383821352ecd4791c03b644a907f63af612ce3bd59f0b846
                            • Opcode Fuzzy Hash: 594b6fa9ee56981ed078ffaf1ba668886877028615b6167003ea8e1d6af961d6
                            • Instruction Fuzzy Hash: 0301B536209506AAEB419FDDEC00FD737E8AF02765B00C415F618DB091EB70D588979D
                            APIs
                            • OpenProcessToken.ADVAPI32(000000FF,00000028,?,00000000,?,?,1000238F,SeDebugPrivilege,00000001,?), ref: 10002F36
                            • LookupPrivilegeValueA.ADVAPI32(00000000,00000010,?), ref: 10002F4F
                            • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000001,00000010,00000001,00000010), ref: 10002F7F
                            • GetLastError.KERNEL32 ref: 10002F8B
                            • CloseHandle.KERNEL32(?,?,?,1000238F,SeDebugPrivilege), ref: 10002FAC
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976574315.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                            • Associated: 00000001.00000002.2976553438.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000001.00000002.2976597083.0000000010004000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000001.00000002.2976619836.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_10000000_Au_.jbxd
                            Similarity
                            • API ID: Token$AdjustCloseErrorHandleLastLookupOpenPrivilegePrivilegesProcessValue
                            • String ID:
                            • API String ID: 379965542-0
                            • Opcode ID: ea75d512c8d60668871e854bdf4281ff2e21e264b9bbcfff9d41e9c086985a66
                            • Instruction ID: bd85016692142ef6ea7efd5700280bb8306efffd53f88ef5a6bafc971b69a3c0
                            • Opcode Fuzzy Hash: ea75d512c8d60668871e854bdf4281ff2e21e264b9bbcfff9d41e9c086985a66
                            • Instruction Fuzzy Hash: 86111CB5A0020AEFEB01CFE5CC85AEEBBB8EB04385F104535E501D2194D7B4DA849B60
                            APIs
                              • Part of subcall function 6E5C9287: __getptd_noexit.LIBCMT ref: 6E5C9288
                              • Part of subcall function 6E5C9287: __amsg_exit.LIBCMT ref: 6E5C9295
                            • GetLocaleInfoW.KERNEL32(00000000,?,?,000000F0), ref: 6E5D1EE9
                            • GetLocaleInfoW.KERNEL32(00000000,?,?,000000F0), ref: 6E5D1F36
                            • GetLocaleInfoW.KERNEL32(00000000,?,?,000000F0), ref: 6E5D1FE6
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: InfoLocale$__amsg_exit__getptd_noexit
                            • String ID:
                            • API String ID: 41668988-0
                            • Opcode ID: 181b70e6997908da4c0e6f9cad031c3db22b8dcb1e6eb2232e6409bec85c0bf4
                            • Instruction ID: 75f9195fdcc6a24a50688af18f1381e8112b9d5b25d83be37e265b5bbf08f57b
                            • Opcode Fuzzy Hash: 181b70e6997908da4c0e6f9cad031c3db22b8dcb1e6eb2232e6409bec85c0bf4
                            • Instruction Fuzzy Hash: 015100715142079FEB188FA8CA91BBAB7FCEF01715F108169E900CA184EB74D94CCB65
                            APIs
                            • VirtualQuery.KERNEL32(?,?,0000001C), ref: 6E5BE5E2
                            • GetSystemInfo.KERNEL32(?,?,?,0000001C), ref: 6E5BE5FA
                            • VirtualAlloc.KERNEL32(?,-00000001,00001000,00000004,?,?,0000001C), ref: 6E5BE651
                            • VirtualProtect.KERNEL32(?,-00000001,00000104,?,?,?,0000001C), ref: 6E5BE666
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: Virtual$AllocInfoProtectQuerySystem
                            • String ID:
                            • API String ID: 3562403962-0
                            • Opcode ID: b300a7fa29cfffa433ae9a89257ca866171fff1db4559fc1311daf0414ac6caa
                            • Instruction ID: 957ec7f601ecad7843f147331efc47eaacd3815545f87e26032dcd69ecfcc882
                            • Opcode Fuzzy Hash: b300a7fa29cfffa433ae9a89257ca866171fff1db4559fc1311daf0414ac6caa
                            • Instruction Fuzzy Hash: 36215A72A0011AABDF10CFE5DC98AEFB7FCAB45794B0504A5E915E7240EF74A9048BA1
                            APIs
                            • GetSystemTime.KERNEL32(?), ref: 6E5B1F1D
                            • swprintf.LIBCMT ref: 6E5B1F5C
                              • Part of subcall function 6E5A49EE: GlobalAlloc.KERNEL32(00000040,?,?,?,6E5B184C), ref: 6E5A4A06
                              • Part of subcall function 6E5A49EE: lstrcpynA.KERNEL32(00000004,00000000,?,?,6E5B184C), ref: 6E5A4A19
                            Strings
                            • %04i-%02i-%02iT%02i:%02i:%02iZ, xrefs: 6E5B1F51
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: AllocGlobalSystemTimelstrcpynswprintf
                            • String ID: %04i-%02i-%02iT%02i:%02i:%02iZ
                            • API String ID: 3638968448-3458534206
                            • Opcode ID: 1feb306261c41829c146babfe9ff42e56709b80a8c4a27cc51d0979247d0db43
                            • Instruction ID: 55f73140a2351c26d7a39c312c0634a3c9ce3fb3c684ef333e4a1937a7595c3f
                            • Opcode Fuzzy Hash: 1feb306261c41829c146babfe9ff42e56709b80a8c4a27cc51d0979247d0db43
                            • Instruction Fuzzy Hash: 2311C5B5900609AFCF50DFE8C945AEE77F8EB0C605F51445AFA45E6280EB38ED44CB60
                            APIs
                              • Part of subcall function 6E5C9287: __getptd_noexit.LIBCMT ref: 6E5C9288
                              • Part of subcall function 6E5C9287: __amsg_exit.LIBCMT ref: 6E5C9295
                            • _GetPrimaryLen.LIBCMT ref: 6E5D1DDB
                            • EnumSystemLocalesW.KERNEL32(6E5D1E90,00000001,000000A0,?,?,6E5D23AE,00000000,?,?,?,?,?,00000055), ref: 6E5D1DEB
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: EnumLocalesPrimarySystem__amsg_exit__getptd_noexit
                            • String ID:
                            • API String ID: 3487593440-0
                            • Opcode ID: 7ec54ca605482b4de65fc97f825d7d7388086f864f57dd2d6aafca216db73fb0
                            • Instruction ID: 22d7e6a23ad237fd4688445ee42926da05426d16be9cd1b327246eaf95089e6a
                            • Opcode Fuzzy Hash: 7ec54ca605482b4de65fc97f825d7d7388086f864f57dd2d6aafca216db73fb0
                            • Instruction Fuzzy Hash: 1801F232450307DFEB209FF8D605BA5BBE8EF41B26F104D2DE19A86180D7B8A05CCB84
                            APIs
                              • Part of subcall function 6E5C9287: __getptd_noexit.LIBCMT ref: 6E5C9288
                              • Part of subcall function 6E5C9287: __amsg_exit.LIBCMT ref: 6E5C9295
                            • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,6E5D2052,00000000,00000000,?), ref: 6E5D2282
                            • _GetPrimaryLen.LIBCMT ref: 6E5D22A1
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: InfoLocalePrimary__amsg_exit__getptd_noexit
                            • String ID:
                            • API String ID: 2554324226-0
                            • Opcode ID: 5511a3c34a944089e6fcc3298f9b16bbc603e18e11e17fe52d84437b9c4e3d26
                            • Instruction ID: 829a124fc324367e8826fcd113092a4efa45902a2056e3811b515fc023fbbdd2
                            • Opcode Fuzzy Hash: 5511a3c34a944089e6fcc3298f9b16bbc603e18e11e17fe52d84437b9c4e3d26
                            • Instruction Fuzzy Hash: FDF02B36A10105BBEF4456F8DC11BEA77DCEB81758F00443AFA15E3040EB70E90486A4
                            APIs
                              • Part of subcall function 6E5C9287: __getptd_noexit.LIBCMT ref: 6E5C9288
                              • Part of subcall function 6E5C9287: __amsg_exit.LIBCMT ref: 6E5C9295
                            • _GetPrimaryLen.LIBCMT ref: 6E5D1E3F
                            • EnumSystemLocalesW.KERNEL32(6E5D2083,00000001,?,?,6E5D2378,6E5CA270,?,?,00000055,?,?,6E5CA270,?,?,?), ref: 6E5D1E52
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: EnumLocalesPrimarySystem__amsg_exit__getptd_noexit
                            • String ID:
                            • API String ID: 3487593440-0
                            • Opcode ID: d91b22c66f1fad38e5a7d9e4b56529ad6b4686b80bf341f6efe65b8a0ca70834
                            • Instruction ID: 81a87a2bffbe432190125d53aef771ff8ca27dc63e4ddc71f911d9cb662f0252
                            • Opcode Fuzzy Hash: d91b22c66f1fad38e5a7d9e4b56529ad6b4686b80bf341f6efe65b8a0ca70834
                            • Instruction Fuzzy Hash: E3F0E572964305EEEB115FF8E804FE77FDDDF42B24F104C19E5898A181DB715C4886A9
                            APIs
                            • SetUnhandledExceptionFilter.KERNEL32(00000000,6E5B176E,6E5C58FF,6E5B1446,?,?,00000001), ref: 6E5C5146
                            • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 6E5C514F
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: ExceptionFilterUnhandled
                            • String ID:
                            • API String ID: 3192549508-0
                            • Opcode ID: 64ad686024f2e45ca583e3d29565064e3710100caf86570c549148d25abad043
                            • Instruction ID: be482163359cdc42a4d46a47b438b3e6f0e81bc32b6dd7ef1896eb773ac735c8
                            • Opcode Fuzzy Hash: 64ad686024f2e45ca583e3d29565064e3710100caf86570c549148d25abad043
                            • Instruction Fuzzy Hash: 89B09231044608BBCE002BE1D809B8A3F28EB0A692F010410F60D440528F6254508A9A
                            APIs
                              • Part of subcall function 6E5C9287: __getptd_noexit.LIBCMT ref: 6E5C9288
                              • Part of subcall function 6E5C9287: __amsg_exit.LIBCMT ref: 6E5C9295
                            • GetLocaleInfoW.KERNEL32(00000000,?,?,000000F0), ref: 6E5D20DC
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: InfoLocale__amsg_exit__getptd_noexit
                            • String ID:
                            • API String ID: 3113341244-0
                            • Opcode ID: eb911e20ee990039cf972578bbca375e951f08119519c2471cd2efdc6b4706ff
                            • Instruction ID: 93356634e25e639a8002ab3c67ab1e85062d70a41ed22ca5f5a71ff0cb045232
                            • Opcode Fuzzy Hash: eb911e20ee990039cf972578bbca375e951f08119519c2471cd2efdc6b4706ff
                            • Instruction Fuzzy Hash: AF210032910206AFDB048FE8D850BFB33ECEF81718F00817AEA04C7080EB749949CB69
                            APIs
                              • Part of subcall function 6E5C9287: __getptd_noexit.LIBCMT ref: 6E5C9288
                              • Part of subcall function 6E5C9287: __amsg_exit.LIBCMT ref: 6E5C9295
                            • GetLocaleInfoW.KERNEL32(00000000,?,?,000000F0,6E5CA277,00000000,6E5CA397), ref: 6E5D1CFA
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: InfoLocale__amsg_exit__getptd_noexit
                            • String ID: D^nU
                            • API String ID: 3113341244-526791073
                            • Opcode ID: fced7f199df78ac141993417c4681a8f2fdee6f0b1af612bd8a50913c40cb090
                            • Instruction ID: 1e0c0bf98eec673ad85b853bb742d2833959796fb841e20531e406feed8ab61d
                            • Opcode Fuzzy Hash: fced7f199df78ac141993417c4681a8f2fdee6f0b1af612bd8a50913c40cb090
                            • Instruction Fuzzy Hash: 35F0A472610205ABC7089BF8C855AFA33EC9B85719F01057DE641D7180EB745D058769
                            APIs
                            • EnumSystemLocalesW.KERNEL32(6E5C5498,00000001,?,6E5D1628,6E5D16C6,00000003,00000000,?,?,00000000,00000000,00000000,00000000,00000000), ref: 6E5C54DA
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: EnumLocalesSystem
                            • String ID:
                            • API String ID: 2099609381-0
                            • Opcode ID: eb996cce7584a035f2a450be07a9e4d8d5df360cf7988da65e252b9121de8712
                            • Instruction ID: 3a8c434d0a6f6e89a1bc8201082a2ff75775ff5f3ec6875c8052f504ebee4823
                            • Opcode Fuzzy Hash: eb996cce7584a035f2a450be07a9e4d8d5df360cf7988da65e252b9121de8712
                            • Instruction Fuzzy Hash: 6BE04631150708ABDF12CFE4CC82B593BE4BB06702F424404F60C8A151CB71A0608B45
                            APIs
                            • GetLocaleInfoW.KERNEL32(00000000,00000000,00000002,?,?,6E5C6285,?,?,?,00000002,00000000,00000000,00000000), ref: 6E5C5510
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: InfoLocale
                            • String ID:
                            • API String ID: 2299586839-0
                            • Opcode ID: b01c2568af5531964bf9c527b77cd51c75b6d1ea8ef587b8c996b576af5292f6
                            • Instruction ID: c434efedb2890f27a252eff75d1e3a71b5b5ce8610ecc980162050aae4d01868
                            • Opcode Fuzzy Hash: b01c2568af5531964bf9c527b77cd51c75b6d1ea8ef587b8c996b576af5292f6
                            • Instruction Fuzzy Hash: A1D06772010609BFCF019FE0E855CAA3BA9FB89615B494849F91886510DF32A5209B62
                            APIs
                            • GetDlgItem.USER32(?,00000403), ref: 004050A1
                            • GetDlgItem.USER32(?,000003EE), ref: 004050B0
                            • GetClientRect.USER32(?,?), ref: 004050ED
                            • GetSystemMetrics.USER32(00000015), ref: 004050F5
                            • SendMessageA.USER32(?,0000101B,00000000,00000002), ref: 00405116
                            • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 00405127
                            • SendMessageA.USER32(?,00001001,00000000,00000110), ref: 0040513A
                            • SendMessageA.USER32(?,00001026,00000000,00000110), ref: 00405148
                            • SendMessageA.USER32(?,00001024,00000000,?), ref: 0040515B
                            • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 0040517D
                            • ShowWindow.USER32(?,00000008), ref: 00405191
                            • GetDlgItem.USER32(?,000003EC), ref: 004051B2
                            • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 004051C2
                            • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 004051DB
                            • SendMessageA.USER32(00000000,00002001,00000000,00000110), ref: 004051E7
                            • GetDlgItem.USER32(?,000003F8), ref: 004050BF
                              • Part of subcall function 00403F4D: SendMessageA.USER32(00000028,?,00000001,00403D7E), ref: 00403F5B
                            • GetDlgItem.USER32(?,000003EC), ref: 00405204
                            • CreateThread.KERNEL32(00000000,00000000,Function_00004FD6,00000000), ref: 00405212
                            • CloseHandle.KERNEL32(00000000), ref: 00405219
                            • ShowWindow.USER32(00000000), ref: 0040523D
                            • ShowWindow.USER32(?,00000008), ref: 00405242
                            • ShowWindow.USER32(00000008), ref: 00405289
                            • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004052BB
                            • CreatePopupMenu.USER32 ref: 004052CC
                            • AppendMenuA.USER32(00000000,00000000,00000001,00000000), ref: 004052E1
                            • GetWindowRect.USER32(?,?), ref: 004052F4
                            • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405318
                            • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405353
                            • OpenClipboard.USER32(00000000), ref: 00405363
                            • EmptyClipboard.USER32 ref: 00405369
                            • GlobalAlloc.KERNEL32(00000042,?,?,?,00000000,?,00000000), ref: 00405372
                            • GlobalLock.KERNEL32(00000000), ref: 0040537C
                            • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405390
                            • GlobalUnlock.KERNEL32(00000000), ref: 004053A8
                            • SetClipboardData.USER32(00000001,00000000), ref: 004053B3
                            • CloseClipboard.USER32 ref: 004053B9
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2972549926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000001.00000002.2972517186.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972577518.0000000000407000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000409000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000413000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000416000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000041F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000046F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972789889.000000000052B000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_400000_Au_.jbxd
                            Similarity
                            • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                            • String ID: {
                            • API String ID: 590372296-366298937
                            • Opcode ID: f9dd1ec61b611cb119bd1a7c58ba16ca99272bb36659aa2dbc47dc2bbe41bde8
                            • Instruction ID: d5cc792025810b1fa5c52fd71f17093da58624e5fcdd428af89ce0e6d8bd8183
                            • Opcode Fuzzy Hash: f9dd1ec61b611cb119bd1a7c58ba16ca99272bb36659aa2dbc47dc2bbe41bde8
                            • Instruction Fuzzy Hash: 21A15870804208FFDB119FA0DD89AAE3F79FB04354F10417AFA05BA2A0C7B55A41DF59
                            APIs
                            Strings
                            • Cannot get the registered task item at index=%d: %x, xrefs: 6E5A434E
                            • Failed Initialize COM: %x, xrefs: 6E5A3FBF
                            • Failed Initialize Create TaskScheduler Com Instance: %x, xrefs: 6E5A4022
                            • Cannot get the registered tasks, xrefs: 6E5A41D4
                            • Found 0 Tasks, xrefs: 6E5A4207
                            • Failed to get Root folder pointer, xrefs: 6E5A419B
                            • Failed Initialize COM security: %x, xrefs: 6E5A4110
                            • Cannot get the registered task name, xrefs: 6E5A430B
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: Variant$Uninitialize$Clear$Init$_sprintf$CreateFreeH_prolog3_InitializeInstanceString_free
                            • String ID: Cannot get the registered task item at index=%d: %x$Cannot get the registered task name$Cannot get the registered tasks$Failed Initialize COM security: %x$Failed Initialize COM: %x$Failed Initialize Create TaskScheduler Com Instance: %x$Failed to get Root folder pointer$Found 0 Tasks
                            • API String ID: 1180555890-629245218
                            • Opcode ID: 8d6ef795391421a7217c7f994574c28bb8e030b8c426267434735258790e65a4
                            • Instruction ID: a7714b0b78244ea61ce162a0862ad81c9dcdb0ab16546cf6b927c8c4f02408af
                            • Opcode Fuzzy Hash: 8d6ef795391421a7217c7f994574c28bb8e030b8c426267434735258790e65a4
                            • Instruction Fuzzy Hash: 06D148719001299BCB61DFE8CD84BDEB7B9AF49304F0044D9EA09AB241DB719F89CF91
                            APIs
                            • CheckDlgButton.USER32(00000000,-0000040A,00000001), ref: 004040EB
                            • GetDlgItem.USER32(00000000,000003E8), ref: 004040FF
                            • SendMessageA.USER32(00000000,0000045B,00000001,00000000), ref: 0040411D
                            • GetSysColor.USER32(?), ref: 0040412E
                            • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 0040413D
                            • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 0040414C
                            • lstrlenA.KERNEL32(?), ref: 00404156
                            • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 00404164
                            • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 00404173
                            • GetDlgItem.USER32(?,0000040A), ref: 004041D6
                            • SendMessageA.USER32(00000000), ref: 004041D9
                            • GetDlgItem.USER32(?,000003E8), ref: 00404204
                            • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 00404244
                            • LoadCursorA.USER32(00000000,00007F02), ref: 00404253
                            • SetCursor.USER32(00000000), ref: 0040425C
                            • ShellExecuteA.SHELL32(0000070B,open,@C,00000000,00000000,00000001), ref: 0040426F
                            • LoadCursorA.USER32(00000000,00007F00), ref: 0040427C
                            • SetCursor.USER32(00000000), ref: 0040427F
                            • SendMessageA.USER32(00000111,00000001,00000000), ref: 004042AB
                            • SendMessageA.USER32(00000010,00000000,00000000), ref: 004042BF
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2972549926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000001.00000002.2972517186.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972577518.0000000000407000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000409000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000413000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000416000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000041F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000046F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972789889.000000000052B000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_400000_Au_.jbxd
                            Similarity
                            • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                            • String ID: @C$N$open
                            • API String ID: 3615053054-560641889
                            • Opcode ID: 7eb73afa992198c4f98a95f14df475cedb7533b9faad63bc5bef38095aed9e24
                            • Instruction ID: 3a1959b9348cc4f2966bed60e082faf824cb7eb55f7dfb2b2a637252ef2f0b8f
                            • Opcode Fuzzy Hash: 7eb73afa992198c4f98a95f14df475cedb7533b9faad63bc5bef38095aed9e24
                            • Instruction Fuzzy Hash: 4F61BFB1A40309BFEB109F60DC45F6A3B69FB44755F10807AFB04BA2D1C7B8A951CB99
                            APIs
                            • GetClassNameA.USER32(?,?,0000001E), ref: 10001C8B
                            • lstrcmpiA.KERNEL32(?,#32770), ref: 10001C96
                            • IsWindowVisible.USER32 ref: 10001CAA
                            • GetWindowLongA.USER32(?,000000EC), ref: 10001CBA
                            • SetWindowLongA.USER32(?,000000EC,00000000), ref: 10001CC9
                            • SetForegroundWindow.USER32(?), ref: 10001CD2
                            • GetDlgItem.USER32(?,00000105), ref: 10001CEC
                            • GetClassNameA.USER32(00000000), ref: 10001CEF
                            • lstrcmpiA.KERNEL32(?,SysCredential), ref: 10001CFA
                            • GetDlgItem.USER32(?,00000106), ref: 10001D16
                            • SendMessageA.USER32(00000000), ref: 10001D1F
                            • GetDlgItem.USER32(?,00000104), ref: 10001D33
                            • SendMessageA.USER32(00000000), ref: 10001D36
                            • CallNextHookEx.USER32(00000000,?,?), ref: 10001D45
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976574315.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                            • Associated: 00000001.00000002.2976553438.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000001.00000002.2976597083.0000000010004000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000001.00000002.2976619836.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_10000000_Au_.jbxd
                            Similarity
                            • API ID: Window$Item$ClassLongMessageNameSendlstrcmpi$CallForegroundHookNextVisible
                            • String ID: #32770$SysCredential
                            • API String ID: 898850336-2483313885
                            • Opcode ID: bc5a4a3c7dfef6ba79154aa31c7bb68ed6e3f59c4a469a5e385da3355d7c1385
                            • Instruction ID: c26e0e65b24013f7fb045945b6ce819b1870cb7cba784f0436b3eee35e59ed1c
                            • Opcode Fuzzy Hash: bc5a4a3c7dfef6ba79154aa31c7bb68ed6e3f59c4a469a5e385da3355d7c1385
                            • Instruction Fuzzy Hash: EE213971640359ABFB20AFA1CC89FEA77BCEF48781F010919F751A60A4D7B4E9449B24
                            APIs
                            • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                            • BeginPaint.USER32(?,?), ref: 00401047
                            • GetClientRect.USER32(?,?), ref: 0040105B
                            • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                            • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                            • DeleteObject.GDI32(?), ref: 004010ED
                            • CreateFontIndirectA.GDI32(?), ref: 00401105
                            • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                            • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                            • SelectObject.GDI32(00000000,?), ref: 00401140
                            • DrawTextA.USER32(00000000,00442EA0,000000FF,00000010,00000820), ref: 00401156
                            • SelectObject.GDI32(00000000,00000000), ref: 00401160
                            • DeleteObject.GDI32(?), ref: 00401165
                            • EndPaint.USER32(?,?), ref: 0040116E
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2972549926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000001.00000002.2972517186.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972577518.0000000000407000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000409000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000413000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000416000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000041F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000046F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972789889.000000000052B000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_400000_Au_.jbxd
                            Similarity
                            • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                            • String ID: F
                            • API String ID: 941294808-1304234792
                            • Opcode ID: 055318d4bc47e4a764edf33350f334e63965e525b0f85424403fd80477bc7367
                            • Instruction ID: ad11f47ad4c56fba0198c5e023b152b535431d91685ad324ade778771994e4e2
                            • Opcode Fuzzy Hash: 055318d4bc47e4a764edf33350f334e63965e525b0f85424403fd80477bc7367
                            • Instruction Fuzzy Hash: 68419A72804249AFCB058FA5CD459BFBBB9FF45314F00812AF951AA1A0C778AA50DFA5
                            APIs
                              • Part of subcall function 06D91DD9: lstrcpynA.KERNEL32(06D91054,?,?,?,06D91054,?), ref: 06D91E06
                              • Part of subcall function 06D91DD9: GlobalFree.KERNELBASE ref: 06D91E16
                            • lstrcmpiA.KERNEL32(?,save), ref: 06D91168
                            • GetFileAttributesA.KERNEL32(06D948A0), ref: 06D9117A
                            • lstrcpyA.KERNEL32(06D94CA0,06D948A0), ref: 06D91193
                            • lstrcpyA.KERNEL32(06D944A0,All Files|*.*), ref: 06D911B6
                            • CharNextA.USER32(06D944A0), ref: 06D911D3
                            • GetCurrentDirectoryA.KERNEL32(00000400,06D940A0), ref: 06D911E9
                            • GetSaveFileNameA.COMDLG32(0000004C), ref: 06D911FD
                            • GetOpenFileNameA.COMDLG32(0000004C), ref: 06D91205
                            • CommDlgExtendedError.COMDLG32 ref: 06D9120B
                            • GetSaveFileNameA.COMDLG32(0000004C), ref: 06D91227
                            • GetOpenFileNameA.COMDLG32(0000004C), ref: 06D9122F
                            • SetCurrentDirectoryA.KERNEL32(06D940A0,06D948A0), ref: 06D91247
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976302121.0000000006D91000.00000020.00000001.01000000.00000009.sdmp, Offset: 06D90000, based on PE: true
                            • Associated: 00000001.00000002.2976276508.0000000006D90000.00000002.00000001.01000000.00000009.sdmpDownload File
                            • Associated: 00000001.00000002.2976439780.0000000006D93000.00000002.00000001.01000000.00000009.sdmpDownload File
                            • Associated: 00000001.00000002.2976488802.0000000006D94000.00000008.00000001.01000000.00000009.sdmpDownload File
                            • Associated: 00000001.00000002.2976529163.0000000006D97000.00000002.00000001.01000000.00000009.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6d90000_Au_.jbxd
                            Similarity
                            • API ID: File$Name$CurrentDirectoryOpenSavelstrcpy$AttributesCharCommErrorExtendedFreeGlobalNextlstrcmpilstrcpyn
                            • String ID: All Files|*.*$L$save
                            • API String ID: 3853173656-601108453
                            • Opcode ID: 7856b16b826f9ef0434e509a071d83324290c94a31b7b0e483fb8a33f8dc0a81
                            • Instruction ID: 855ecc98bab3210662c3339219f07fc80068a55b288fa6480c1be399ede4744c
                            • Opcode Fuzzy Hash: 7856b16b826f9ef0434e509a071d83324290c94a31b7b0e483fb8a33f8dc0a81
                            • Instruction Fuzzy Hash: 6241F574D01345BFDFA0AF66EC49B5A3FE9AB06318F410115E65EE6342C7B48809CBB0
                            APIs
                              • Part of subcall function 00405E88: GetModuleHandleA.KERNEL32(?,?,00000000,0040327F,00000008), ref: 00405E9A
                              • Part of subcall function 00405E88: LoadLibraryA.KERNELBASE(?,?,00000000,0040327F,00000008), ref: 00405EA5
                              • Part of subcall function 00405E88: GetProcAddress.KERNEL32(00000000,?), ref: 00405EB6
                            • CloseHandle.KERNEL32(00000000,?,00000000,00000001,00000001,?,00000000,?,?,00405649,?,00000000,000000F1,?), ref: 00405901
                            • GetShortPathNameA.KERNEL32(?,0043E630,00000400), ref: 0040590A
                            • GetShortPathNameA.KERNEL32(00000000,0043E0A8,00000400), ref: 00405927
                            • wsprintfA.USER32 ref: 00405945
                            • GetFileSize.KERNEL32(00000000,00000000,0043E0A8,C0000000,00000004,0043E0A8,?,?,?,00000000,000000F1,?), ref: 00405980
                            • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,00000000,000000F1,?), ref: 0040598F
                            • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,00000000,000000F1,?), ref: 004059A5
                            • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000,?,0043DCA8,00000000,-0000000A,00409350,00000000,[Rename],?,?,00000000,000000F1,?), ref: 004059EB
                            • WriteFile.KERNEL32(00000000,00000000,?,?,00000000,?,?,00000000,000000F1,?), ref: 004059FD
                            • GlobalFree.KERNEL32(00000000), ref: 00405A04
                            • CloseHandle.KERNEL32(00000000,?,?,00000000,000000F1,?), ref: 00405A0B
                              • Part of subcall function 004057B2: lstrlenA.KERNEL32(00000000,?,00000000,00000000,004059C0,00000000,[Rename],?,?,00000000,000000F1,?), ref: 004057B9
                              • Part of subcall function 004057B2: lstrlenA.KERNEL32(00000000,00000000,?,00000000,00000000,004059C0,00000000,[Rename],?,?,00000000,000000F1,?), ref: 004057E9
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2972549926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000001.00000002.2972517186.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972577518.0000000000407000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000409000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000413000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000416000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000041F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000046F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972789889.000000000052B000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_400000_Au_.jbxd
                            Similarity
                            • API ID: File$Handle$CloseGlobalNamePathShortlstrlen$AddressAllocFreeLibraryLoadModulePointerProcReadSizeWritewsprintf
                            • String ID: %s=%s$0C$[Rename]
                            • API String ID: 3772915668-2466990604
                            • Opcode ID: 0cba16278340fcd60d1fa59ff28b3b53525deda11aae3c5a7c4788638b26bb93
                            • Instruction ID: e4acf15c9d64fbf53db5c011c469a52faadac1e9922c4ea510687d497f36d3fc
                            • Opcode Fuzzy Hash: 0cba16278340fcd60d1fa59ff28b3b53525deda11aae3c5a7c4788638b26bb93
                            • Instruction Fuzzy Hash: AF410231605B01ABE3207B619C89F6B3A5CEF85715F140136FE05F22D2E678A801CEBE
                            APIs
                              • Part of subcall function 02501541: GlobalAlloc.KERNELBASE(00000040,02501577,?,?,02501804,?,02501017), ref: 02501549
                              • Part of subcall function 02501561: lstrcpyA.KERNEL32(00000000,?,?,?,02501804,?,02501017), ref: 0250157E
                              • Part of subcall function 02501561: GlobalFree.KERNEL32 ref: 0250158F
                            • GlobalAlloc.KERNEL32(00000040,000014A4), ref: 02501E28
                            • lstrcpyA.KERNEL32(00000008,?), ref: 02501E74
                            • lstrcpyA.KERNEL32(00000408,?), ref: 02501E7E
                            • GlobalFree.KERNEL32(00000000), ref: 02501E98
                            • GlobalFree.KERNEL32(?), ref: 02501F80
                            • GlobalFree.KERNEL32(?), ref: 02501F85
                            • GlobalFree.KERNEL32(?), ref: 02501F8A
                            • GlobalFree.KERNEL32(00000000), ref: 0250212C
                            • lstrcpyA.KERNEL32(?,?), ref: 02502273
                            • GetModuleHandleA.KERNEL32(00000008), ref: 025022DA
                            • LoadLibraryA.KERNEL32(00000008), ref: 025022EB
                            • GetProcAddress.KERNEL32(?,00000408), ref: 0250230E
                            • lstrcatA.KERNEL32(00000408,02504024), ref: 02502320
                            • GetProcAddress.KERNEL32(?,00000408), ref: 0250232D
                            Memory Dump Source
                            • Source File: 00000001.00000002.2973409424.0000000002501000.00000020.00000001.01000000.00000008.sdmp, Offset: 02500000, based on PE: true
                            • Associated: 00000001.00000002.2973389138.0000000002500000.00000002.00000001.01000000.00000008.sdmpDownload File
                            • Associated: 00000001.00000002.2973429594.0000000002503000.00000002.00000001.01000000.00000008.sdmpDownload File
                            • Associated: 00000001.00000002.2973449141.0000000002505000.00000002.00000001.01000000.00000008.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_2500000_Au_.jbxd
                            Similarity
                            • API ID: Global$Free$lstrcpy$AddressAllocProc$HandleLibraryLoadModulelstrcat
                            • String ID:
                            • API String ID: 2432367840-0
                            • Opcode ID: 2b41169dcd96f810183bfb80cf1aa08488d09e2ee93b3d69509bae27141c8e2b
                            • Instruction ID: 35459f9c47d7b308c301182acf9d5435a86b85b7e3d4059473357f2718dff87e
                            • Opcode Fuzzy Hash: 2b41169dcd96f810183bfb80cf1aa08488d09e2ee93b3d69509bae27141c8e2b
                            • Instruction Fuzzy Hash: D7025C71D04A0ADFCB209FA8CCC87EDBBF4BB08304F54896AD56AE61C0D7749A45CB59
                            APIs
                            • GetDlgItem.USER32(?,000003FB), ref: 004043A2
                            • SetWindowTextA.USER32(?,?), ref: 004043CF
                            • SHBrowseForFolderA.SHELL32(?,0042BC70,?), ref: 00404484
                            • CoTaskMemFree.OLE32(00000000), ref: 0040448F
                            • lstrcmpiA.KERNEL32(Show,00431CA0), ref: 004044C1
                            • lstrcatA.KERNEL32(?,Show), ref: 004044CD
                            • SetDlgItemTextA.USER32(?,000003FB,?), ref: 004044DD
                              • Part of subcall function 0040540B: GetDlgItemTextA.USER32(?,?,00002000,00404510), ref: 0040541E
                              • Part of subcall function 00405DC8: CharNextA.USER32(?,*?|<>/":,00000000,00479000,"C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exe" ,00479000,00000000,00403214,00479000,00000000,00403386), ref: 00405E20
                              • Part of subcall function 00405DC8: CharNextA.USER32(?,?,?,00000000), ref: 00405E2D
                              • Part of subcall function 00405DC8: CharNextA.USER32(?,00479000,"C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exe" ,00479000,00000000,00403214,00479000,00000000,00403386), ref: 00405E32
                              • Part of subcall function 00405DC8: CharPrevA.USER32(?,?,"C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exe" ,00479000,00000000,00403214,00479000,00000000,00403386), ref: 00405E42
                            • GetDiskFreeSpaceA.KERNEL32(00429C68,?,?,0000040F,?,00429C68,00429C68,?,00000000,00429C68,?,?,000003FB,?), ref: 00404596
                            • MulDiv.KERNEL32(?,0000040F,00000400), ref: 004045B1
                            • SetDlgItemTextA.USER32(00000000,00000400,00429C58), ref: 0040462A
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2972549926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000001.00000002.2972517186.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972577518.0000000000407000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000409000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000413000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000416000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000041F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000046F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972789889.000000000052B000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_400000_Au_.jbxd
                            Similarity
                            • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpi
                            • String ID: A$Show
                            • API String ID: 2246997448-4076820621
                            • Opcode ID: 3b5d6d58123ad3be4efc0fc18460bcaf2051817d57d9130af0bc9e59323d7d5d
                            • Instruction ID: 837b9add0ee4c7fa7edda3a2cfc136c172d34a8f6a08fd8700377a4301a7160d
                            • Opcode Fuzzy Hash: 3b5d6d58123ad3be4efc0fc18460bcaf2051817d57d9130af0bc9e59323d7d5d
                            • Instruction Fuzzy Hash: 57917EB1900208ABDB11DFA2CD84AAF7BB8EF85354F10447BF604B62D1D77C9A419B69
                            APIs
                            • __EH_prolog3_GS.LIBCMT ref: 6E5A3D82
                            • CoInitialize.OLE32(00000000), ref: 6E5A3DA7
                            • _sprintf.LIBCMT ref: 6E5A3DBE
                            • CoCreateInstance.OLE32(6E5DA43C,00000000,00000001,6E5DA42C,?), ref: 6E5A3DF3
                            • CoUninitialize.OLE32 ref: 6E5A3E2A
                            • _free.LIBCMT ref: 6E5A3EE6
                            • CoTaskMemFree.OLE32(?,00000000,?,?,00000003), ref: 6E5A3EFB
                            • CoTaskMemFree.OLE32(?), ref: 6E5A3F11
                            • CoUninitialize.OLE32 ref: 6E5A3F43
                            Strings
                            • Failed Initialize COM: %x, xrefs: 6E5A3DB2
                            • Failed Initialize Create TaskScheduler Com Instance: %x, xrefs: 6E5A3DFE
                            • Failed To Get Enumeration Object, xrefs: 6E5A3E30
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: FreeTaskUninitialize$CreateH_prolog3_InitializeInstance_free_sprintf
                            • String ID: Failed Initialize COM: %x$Failed Initialize Create TaskScheduler Com Instance: %x$Failed To Get Enumeration Object
                            • API String ID: 3037062998-2724824746
                            • Opcode ID: 10f8405d8890efd82589d2cd12eb902d7cc840be75178d286f143e979819ef9d
                            • Instruction ID: e6e367d3c52d9f81a89584571276c827c2cdc25bf45a56f4d6ac7a688b3e7c78
                            • Opcode Fuzzy Hash: 10f8405d8890efd82589d2cd12eb902d7cc840be75178d286f143e979819ef9d
                            • Instruction Fuzzy Hash: BB512D70E001199BDB24DFA9CD94FEDB7B9AF58304F0084E9E609A7641EB705E89CF50
                            APIs
                            • DuplicateHandle.KERNEL32(000000FF,00000000,?,00000006,00000000,00000000), ref: 100020B1
                            • DuplicateHandle.KERNEL32(000000FF,?,?,?,00100002,00000000,00000000), ref: 100020E5
                            • DestroyWindow.USER32(?), ref: 10002115
                            • SendMessageA.USER32(?,00008005,00000000,00000000), ref: 1000212C
                            • PostMessageA.USER32(00000000,00000012,00000000,00000000), ref: 10002137
                            • GetWindowLongA.USER32(?,000000F0), ref: 10002144
                            • SetForegroundWindow.USER32(?), ref: 10002154
                            • ShowWindow.USER32(?,00000000), ref: 1000215F
                            • PostMessageA.USER32(?,00008002,?,?), ref: 1000216E
                            • ShowWindow.USER32(00000000), ref: 1000218D
                            • DestroyWindow.USER32 ref: 10002199
                            • DefWindowProcA.USER32(?,?,?,?), ref: 100021A9
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976574315.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                            • Associated: 00000001.00000002.2976553438.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000001.00000002.2976597083.0000000010004000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000001.00000002.2976619836.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_10000000_Au_.jbxd
                            Similarity
                            • API ID: Window$Message$DestroyDuplicateHandlePostShow$ForegroundLongProcSend
                            • String ID:
                            • API String ID: 1417430255-0
                            • Opcode ID: eae6238f62bcba03fcf7096643482a2d2d492833aea162d38a7964b38814e257
                            • Instruction ID: 74c6bae19b8af0f634bdf56c16651beaf3ca8c8e6039be5ed8003dd7f4f1f71b
                            • Opcode Fuzzy Hash: eae6238f62bcba03fcf7096643482a2d2d492833aea162d38a7964b38814e257
                            • Instruction Fuzzy Hash: F6517A7110025AABFB15CFA4CD88EEA3BB5FB587C0F110124FA15D61ACDB718EA1DB20
                            APIs
                            • __EH_prolog3_GS.LIBCMT ref: 6E5ADCFA
                              • Part of subcall function 6E5A1792: _memmove.LIBCMT ref: 6E5A189C
                              • Part of subcall function 6E5A1792: __EH_prolog3.LIBCMT ref: 6E5A18E1
                              • Part of subcall function 6E5A1792: _memmove.LIBCMT ref: 6E5A1802
                              • Part of subcall function 6E5ACCEA: SysFreeString.OLEAUT32 ref: 6E5ACD1B
                            • SysFreeString.OLEAUT32(?), ref: 6E5ADDE3
                            • SysFreeString.OLEAUT32(?), ref: 6E5ADDE8
                            • VariantInit.OLEAUT32(?), ref: 6E5ADE34
                            • SysFreeString.OLEAUT32(?), ref: 6E5ADE71
                            • VariantClear.OLEAUT32(?), ref: 6E5ADF16
                            • VariantClear.OLEAUT32(?), ref: 6E5ADF6F
                            • VariantClear.OLEAUT32(?), ref: 6E5ADF75
                              • Part of subcall function 6E5A3A76: __EH_prolog3.LIBCMT ref: 6E5A3A7D
                              • Part of subcall function 6E5A3B0A: InterlockedDecrement.KERNEL32(00000001), ref: 6E5A3B12
                              • Part of subcall function 6E5A3B0A: SysFreeString.OLEAUT32 ref: 6E5A3B28
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: FreeString$Variant$Clear$H_prolog3_memmove$DecrementH_prolog3_InitInterlocked
                            • String ID: FROM $SELECT $WQL
                            • API String ID: 478432954-921697302
                            • Opcode ID: 5a01aab29f18bbf60f2c51aaecbc36f2f689af95a9c6de6b70927c3e76e367e2
                            • Instruction ID: 9036a3f3900d6bb394bd93252aef8bfd509f160f0e034d88811931ca8349132c
                            • Opcode Fuzzy Hash: 5a01aab29f18bbf60f2c51aaecbc36f2f689af95a9c6de6b70927c3e76e367e2
                            • Instruction Fuzzy Hash: 0291AF71901248AFDF04EBE8D954FEEBBF9AF85308F104559E611EB180DB709E08CB61
                            APIs
                            • __EH_prolog3_GS.LIBCMT ref: 6E5ADFC8
                              • Part of subcall function 6E5A1792: _memmove.LIBCMT ref: 6E5A189C
                              • Part of subcall function 6E5A1792: __EH_prolog3.LIBCMT ref: 6E5A18E1
                              • Part of subcall function 6E5ACCEA: SysFreeString.OLEAUT32 ref: 6E5ACD1B
                            • SysFreeString.OLEAUT32(?), ref: 6E5AE08D
                            • SysFreeString.OLEAUT32(?), ref: 6E5AE092
                            • VariantInit.OLEAUT32(?), ref: 6E5AE0DC
                            • SysFreeString.OLEAUT32(?), ref: 6E5AE11B
                            • VariantClear.OLEAUT32(000000FF), ref: 6E5AE1BC
                            • VariantClear.OLEAUT32(000000FF), ref: 6E5AE215
                            • VariantClear.OLEAUT32(?), ref: 6E5AE21B
                              • Part of subcall function 6E5A3A76: __EH_prolog3.LIBCMT ref: 6E5A3A7D
                              • Part of subcall function 6E5A3B0A: InterlockedDecrement.KERNEL32(00000001), ref: 6E5A3B12
                              • Part of subcall function 6E5A3B0A: SysFreeString.OLEAUT32 ref: 6E5A3B28
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: FreeString$Variant$Clear$H_prolog3$DecrementH_prolog3_InitInterlocked_memmove
                            • String ID: FROM $SELECT $WQL
                            • API String ID: 2420725925-921697302
                            • Opcode ID: 4505d85442d9b28e0d6a7043695e2456cc24d37cdbcf0c14aab8ea6928cff4df
                            • Instruction ID: c4d7ed044848414fa7e99680483d198e5a6ccc7d107e726f778a5a25e9c33954
                            • Opcode Fuzzy Hash: 4505d85442d9b28e0d6a7043695e2456cc24d37cdbcf0c14aab8ea6928cff4df
                            • Instruction Fuzzy Hash: E9919E71901248AFEF04DBE8D954FEDBBF9AF89304F108459E611EB291DB709E09CB61
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: _memmove
                            • String ID: invalid string position$string too long
                            • API String ID: 4104443479-4289949731
                            • Opcode ID: a9d30f15420e7ab3a8ece2b2f6d23da89e06c4184a5f3977cdf1fa0740ee3218
                            • Instruction ID: 9192baa6a54e60a36efe7428495ff2058ea24a5bedccb92ba80a75aa63ebc99d
                            • Opcode Fuzzy Hash: a9d30f15420e7ab3a8ece2b2f6d23da89e06c4184a5f3977cdf1fa0740ee3218
                            • Instruction Fuzzy Hash: 40D16CB5A0064ADFDB14CF8DC99299EB7F5FF48744B108929EA45CB700D730EA54CBA1
                            APIs
                            • SendMessageA.USER32(?,?,?), ref: 06D91528
                            • GetDlgItem.USER32(?,?), ref: 06D9153B
                            • GetWindowTextA.USER32(?,00000000,00000400), ref: 06D9165E
                            • DrawTextA.USER32(?,00000000,000000FF,?,00000414), ref: 06D9167F
                            • GetWindowLongA.USER32(?,000000EB), ref: 06D916CA
                            • SetTextColor.GDI32(?,00FF0000), ref: 06D916DC
                            • DrawTextA.USER32(?,00000000,000000FF,00000000,?), ref: 06D916F6
                            • DrawFocusRect.USER32(?,00000010), ref: 06D91717
                            • RemovePropA.USER32(00000000,NSIS: nsControl pointer property), ref: 06D9173B
                            Strings
                            • NSIS: nsControl pointer property, xrefs: 06D91733
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976302121.0000000006D91000.00000020.00000001.01000000.00000009.sdmp, Offset: 06D90000, based on PE: true
                            • Associated: 00000001.00000002.2976276508.0000000006D90000.00000002.00000001.01000000.00000009.sdmpDownload File
                            • Associated: 00000001.00000002.2976439780.0000000006D93000.00000002.00000001.01000000.00000009.sdmpDownload File
                            • Associated: 00000001.00000002.2976488802.0000000006D94000.00000008.00000001.01000000.00000009.sdmpDownload File
                            • Associated: 00000001.00000002.2976529163.0000000006D97000.00000002.00000001.01000000.00000009.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6d90000_Au_.jbxd
                            Similarity
                            • API ID: Text$Draw$Window$ColorFocusItemLongMessagePropRectRemoveSend
                            • String ID: NSIS: nsControl pointer property
                            • API String ID: 2331901045-1714965683
                            • Opcode ID: a27e410f3384d16e1ae3327c296a744cce97fe8147d0d938dc41f6d2d86c5159
                            • Instruction ID: 9da594a68c391eb9156969c1937080e7afe1e3399c766c460055853e8248524b
                            • Opcode Fuzzy Hash: a27e410f3384d16e1ae3327c296a744cce97fe8147d0d938dc41f6d2d86c5159
                            • Instruction Fuzzy Hash: A471AB70D0020BEBDFA19F64DC84BBA7BB6FB00344F454565EA19A6295C771D891CBB0
                            APIs
                            • GetWindowThreadProcessId.USER32(?,?), ref: 10002378
                              • Part of subcall function 10002F22: OpenProcessToken.ADVAPI32(000000FF,00000028,?,00000000,?,?,1000238F,SeDebugPrivilege,00000001,?), ref: 10002F36
                              • Part of subcall function 10002F22: LookupPrivilegeValueA.ADVAPI32(00000000,00000010,?), ref: 10002F4F
                              • Part of subcall function 10002F22: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000001,00000010,00000001,00000010), ref: 10002F7F
                              • Part of subcall function 10002F22: GetLastError.KERNEL32 ref: 10002F8B
                              • Part of subcall function 10002F22: CloseHandle.KERNEL32(?,?,?,1000238F,SeDebugPrivilege), ref: 10002FAC
                            • OpenProcess.KERNEL32(00000040,00000000,?,SeDebugPrivilege,00000001,?), ref: 10002395
                            • GetLastError.KERNEL32 ref: 100023A2
                            • DuplicateHandle.KERNEL32(000000FF,000000FF,00000000,?,00000040,00000000,00000001), ref: 100023BB
                            • SendMessageA.USER32(00008004,00000539,?,SeDebugPrivilege), ref: 100023E4
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976574315.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                            • Associated: 00000001.00000002.2976553438.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000001.00000002.2976597083.0000000010004000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000001.00000002.2976619836.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_10000000_Au_.jbxd
                            Similarity
                            • API ID: Process$ErrorHandleLastOpenToken$AdjustCloseDuplicateLookupMessagePrivilegePrivilegesSendThreadValueWindow
                            • String ID: SeDebugPrivilege
                            • API String ID: 3436673191-2896544425
                            • Opcode ID: cb53f05afa7be2de9fb32b120f72a25d8a9fec339c2f301f330aa57a49db5686
                            • Instruction ID: c66332e51502a56bb2114d803002d8b96d14e5681058ef75f00f033a229ca417
                            • Opcode Fuzzy Hash: cb53f05afa7be2de9fb32b120f72a25d8a9fec339c2f301f330aa57a49db5686
                            • Instruction Fuzzy Hash: 9B21BDB1A00228FFFB01DB94DCC5EAA3BADE7047D5F124125F200A21F8CAB05E449B25
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: Uninitialize$_sprintf$CreateH_prolog3_catch_InitializeInstance
                            • String ID: Failed Initialize COM: %x
                            • API String ID: 1980926234-692858042
                            • Opcode ID: 03ab9a6fe399f8a89658a58a8a97f6f6470160671fc4053130f2062c1487e207
                            • Instruction ID: 5df55a74895da3a1ad5bbdc31d36230a226d5582eb494d07790888506fe88485
                            • Opcode Fuzzy Hash: 03ab9a6fe399f8a89658a58a8a97f6f6470160671fc4053130f2062c1487e207
                            • Instruction Fuzzy Hash: 30317F708001199BCB25DFE8CD44BDD76F96B45308F004999A319A2241EF704F8D8B51
                            APIs
                            • wsprintfA.USER32 ref: 0250265F
                            • GlobalAlloc.KERNEL32(00000040,?,?,?,?,00000000,00000001,02501A8A,00000000), ref: 02502677
                            • StringFromGUID2.OLE32(?,00000000,?,?,?,?,00000000,00000001,02501A8A,00000000), ref: 0250268A
                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,?,00000000,00000001,02501A8A,00000000), ref: 0250269F
                            • GlobalFree.KERNEL32(00000000), ref: 025026A6
                              • Part of subcall function 0250160E: lstrcpyA.KERNEL32(-02504047,00000000,?,0250118F,?,00000000), ref: 02501636
                            • GlobalFree.KERNEL32(?), ref: 02502728
                            • GlobalFree.KERNEL32(00000000), ref: 02502751
                            Memory Dump Source
                            • Source File: 00000001.00000002.2973409424.0000000002501000.00000020.00000001.01000000.00000008.sdmp, Offset: 02500000, based on PE: true
                            • Associated: 00000001.00000002.2973389138.0000000002500000.00000002.00000001.01000000.00000008.sdmpDownload File
                            • Associated: 00000001.00000002.2973429594.0000000002503000.00000002.00000001.01000000.00000008.sdmpDownload File
                            • Associated: 00000001.00000002.2973449141.0000000002505000.00000002.00000001.01000000.00000008.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_2500000_Au_.jbxd
                            Similarity
                            • API ID: Global$Free$AllocByteCharFromMultiStringWidelstrcpywsprintf
                            • String ID:
                            • API String ID: 2278267121-0
                            • Opcode ID: 218716a5f89ce3684817d4c3b9cbf4f5be28a5afc8e94658c2dd8d9be70d8c85
                            • Instruction ID: 8a4333d883a4933f424e882417552178c0772ea80117590ced109777b498c54e
                            • Opcode Fuzzy Hash: 218716a5f89ce3684817d4c3b9cbf4f5be28a5afc8e94658c2dd8d9be70d8c85
                            • Instruction Fuzzy Hash: 0941BC31900605EFDB219F68DCCCD37BBADFB84344B150959FD46CA184DB31AC64DA29
                            APIs
                            • _free.LIBCMT ref: 6E5C5AB0
                              • Part of subcall function 6E5BE079: HeapFree.KERNEL32(00000000,00000000,?,6E5C92FF,00000000,00000001,00000000,6E5B176E,?,?,6E5BDC99,6E5B96DD,?), ref: 6E5BE08D
                              • Part of subcall function 6E5BE079: GetLastError.KERNEL32(00000000,?,6E5C92FF,00000000,00000001,00000000,6E5B176E,?,?,6E5BDC99,6E5B96DD,?), ref: 6E5BE09F
                            • _free.LIBCMT ref: 6E5C5AC3
                            • _free.LIBCMT ref: 6E5C5AE1
                            • _free.LIBCMT ref: 6E5C5AF3
                            • _free.LIBCMT ref: 6E5C5B04
                            • _free.LIBCMT ref: 6E5C5B0F
                            • _free.LIBCMT ref: 6E5C5B31
                            • _free.LIBCMT ref: 6E5C5B4E
                            • _free.LIBCMT ref: 6E5C5B64
                            • InterlockedDecrement.KERNEL32 ref: 6E5C5B76
                            • _free.LIBCMT ref: 6E5C5B90
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: _free$DecrementErrorFreeHeapInterlockedLast
                            • String ID:
                            • API String ID: 148191977-0
                            • Opcode ID: 8a8bd01e7c02b984c33f2a62deefe05c37589dd04338591308fd7bc9db8072f9
                            • Instruction ID: ba385700180318552f7221668dede1eaf3cefed82b2183c7987c2d5a1cdd4528
                            • Opcode Fuzzy Hash: 8a8bd01e7c02b984c33f2a62deefe05c37589dd04338591308fd7bc9db8072f9
                            • Instruction Fuzzy Hash: 5C21B172804A1ADBEF605FE4D8B48653BF8EB4676531B086DEA04A3264CF315C80CB42
                            APIs
                            • __EH_prolog3.LIBCMT ref: 6E5ACAF2
                            • std::_Lockit::_Lockit.LIBCPMT ref: 6E5ACAFC
                              • Part of subcall function 6E5B9775: __lock.LIBCMT ref: 6E5B9786
                            • int.LIBCPMT ref: 6E5ACB13
                              • Part of subcall function 6E5AC730: std::_Lockit::_Lockit.LIBCPMT ref: 6E5AC741
                            • std::locale::_Getfacet.LIBCPMT ref: 6E5ACB1C
                            • ctype.LIBCPMT ref: 6E5ACB36
                            • std::bad_exception::bad_exception.LIBCMT ref: 6E5ACB4A
                            • __CxxThrowException@8.LIBCMT ref: 6E5ACB58
                            • std::_Facet_Register.LIBCPMT ref: 6E5ACB6E
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: std::_$LockitLockit::_$Exception@8Facet_GetfacetH_prolog3RegisterThrow__lockctypestd::bad_exception::bad_exceptionstd::locale::_
                            • String ID: bad cast
                            • API String ID: 2017145326-3145022300
                            • Opcode ID: f2a451acb48740561714a96febafb8663e4deb2d5761c37aaed0d83d4f50bc83
                            • Instruction ID: 983c63eb738da27b3397464f8c91e0da9405baf7273f8471f48978326974177d
                            • Opcode Fuzzy Hash: f2a451acb48740561714a96febafb8663e4deb2d5761c37aaed0d83d4f50bc83
                            • Instruction Fuzzy Hash: 290180769006299BCF05DFE8C920AED33F8BF85714F600908D711AF290DF359E048B91
                            APIs
                            • __EH_prolog3.LIBCMT ref: 6E5B0894
                            • std::_Lockit::_Lockit.LIBCPMT ref: 6E5B089E
                              • Part of subcall function 6E5B9775: __lock.LIBCMT ref: 6E5B9786
                            • int.LIBCPMT ref: 6E5B08B5
                              • Part of subcall function 6E5AC730: std::_Lockit::_Lockit.LIBCPMT ref: 6E5AC741
                            • std::locale::_Getfacet.LIBCPMT ref: 6E5B08BE
                            • codecvt.LIBCPMT ref: 6E5B08D8
                            • std::bad_exception::bad_exception.LIBCMT ref: 6E5B08EC
                            • __CxxThrowException@8.LIBCMT ref: 6E5B08FA
                            • std::_Facet_Register.LIBCPMT ref: 6E5B0910
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: std::_$LockitLockit::_$Exception@8Facet_GetfacetH_prolog3RegisterThrow__lockcodecvtstd::bad_exception::bad_exceptionstd::locale::_
                            • String ID: bad cast
                            • API String ID: 1757418035-3145022300
                            • Opcode ID: 23e011abe5b4364a65875b2f84b87c02fb86c55886bf93954b81faa2c6c88963
                            • Instruction ID: b3d28f2354dc68360d7efb16cfa9455446629c8612f69a6affe243c4595ce89b
                            • Opcode Fuzzy Hash: 23e011abe5b4364a65875b2f84b87c02fb86c55886bf93954b81faa2c6c88963
                            • Instruction Fuzzy Hash: F0019236D10619ABCF15DFE4C9219ED33F8BF84754F10090AE610BB294EF749E048791
                            APIs
                            • __EH_prolog3_GS.LIBCMT ref: 6E5AD22B
                            • _memset.LIBCMT ref: 6E5AD275
                            • GetVersionExA.KERNEL32(?), ref: 6E5AD28A
                            • SysFreeString.OLEAUT32(?), ref: 6E5AD450
                            • VariantClear.OLEAUT32(?), ref: 6E5AD476
                            • VariantClear.OLEAUT32(?), ref: 6E5AD492
                            • VariantClear.OLEAUT32(?), ref: 6E5AD4AE
                            • VariantClear.OLEAUT32(?), ref: 6E5AD4C1
                            • _memset.LIBCMT ref: 6E5AD4DD
                            • ShellExecuteExA.SHELL32(?), ref: 6E5AD544
                              • Part of subcall function 6E5ACE44: __EH_prolog3.LIBCMT ref: 6E5ACE4B
                              • Part of subcall function 6E5ACE44: CoCreateInstance.OLE32(6E5DA44C,00000000,00000004,6E5E1D08,?,00000038,6E5AD2B2), ref: 6E5ACE79
                              • Part of subcall function 6E5ACE44: IUnknown_QueryService.SHLWAPI(?,6E5DA2E8,6E5E1D28,?), ref: 6E5ACECD
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: ClearVariant$_memset$CreateExecuteFreeH_prolog3H_prolog3_InstanceQueryServiceShellStringUnknown_Version
                            • String ID:
                            • API String ID: 3897910360-0
                            • Opcode ID: f0e41c4fb32ee1749f4ce4775bc956f3eb682eacc754f6bcaaddab09bae875ca
                            • Instruction ID: 440240199055b9f76c7a80e41677a379fcaf489b0fe1d83a7184b71dda3071ae
                            • Opcode Fuzzy Hash: f0e41c4fb32ee1749f4ce4775bc956f3eb682eacc754f6bcaaddab09bae875ca
                            • Instruction Fuzzy Hash: 6BA12871900629CFEB21DFA8CC44BDEB7B9AF06304F0145D9EA09AB250D7719E85CF52
                            APIs
                            • __lock.LIBCMT ref: 6E5CAE38
                              • Part of subcall function 6E5C2158: __mtinitlocknum.LIBCMT ref: 6E5C216A
                              • Part of subcall function 6E5C2158: __amsg_exit.LIBCMT ref: 6E5C2176
                              • Part of subcall function 6E5C2158: EnterCriticalSection.KERNEL32(00000000,?,6E5C9357,0000000D), ref: 6E5C2183
                            • __calloc_crt.LIBCMT ref: 6E5CAE49
                              • Part of subcall function 6E5C2EFC: __calloc_impl.LIBCMT ref: 6E5C2F0B
                              • Part of subcall function 6E5C2EFC: Sleep.KERNEL32(00000000), ref: 6E5C2F22
                            • @_EH4_CallFilterFunc@8.LIBCMT ref: 6E5CAE64
                            • GetStartupInfoW.KERNEL32(?,6E5E46D8,00000064,6E5C0246), ref: 6E5CAEBD
                            • __calloc_crt.LIBCMT ref: 6E5CAF08
                            • GetFileType.KERNEL32(00000001), ref: 6E5CAF4F
                            • InitializeCriticalSectionAndSpinCount.KERNEL32(0000000D,00000FA0), ref: 6E5CAF88
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: CriticalSection__calloc_crt$CallCountEnterFileFilterFunc@8InfoInitializeSleepSpinStartupType__amsg_exit__calloc_impl__lock__mtinitlocknum
                            • String ID:
                            • API String ID: 2673217650-0
                            • Opcode ID: 2876c02bd4e354e47951ca3813204c89e7b0eb75feb7a09ba803b78630a30dc1
                            • Instruction ID: 86f05463d5c515505f07d4799a12e06185ece511b1b0eb79a9db91884febf6ae
                            • Opcode Fuzzy Hash: 2876c02bd4e354e47951ca3813204c89e7b0eb75feb7a09ba803b78630a30dc1
                            • Instruction Fuzzy Hash: 9181F4709047468FDB60CFE8C8A05ADBFF0AF4A724B24465DD0B6AB3C2D7349842CB52
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: _memmove
                            • String ID: Win32_ScheduledJob=$invalid string position$string too long$Zn$Zn
                            • API String ID: 4104443479-3873333329
                            • Opcode ID: 1780a3168aae24158dee5bdb908d8c0b72fe9a2156d58ebba29922520c72251e
                            • Instruction ID: 2334bf1d66b6a1d8cda5129705cae40c1d6a0beaf194bb2c706f553933ccfb40
                            • Opcode Fuzzy Hash: 1780a3168aae24158dee5bdb908d8c0b72fe9a2156d58ebba29922520c72251e
                            • Instruction Fuzzy Hash: 1641D375300305DBE724DEDED8A1A6EB3FAFB897047004D2DEA558B641E771DC418B61
                            APIs
                            • SendMessageA.USER32(0001045C,00008003,00000000,00000000), ref: 100024CF
                            • SendMessageA.USER32(00008003,00000001,00000000), ref: 100024DE
                            • PostMessageA.USER32(?,00000408,?,00000000), ref: 100024F9
                            • GetWindowRect.USER32(?,?), ref: 10002502
                            • SetWindowPos.USER32(?,?,?,?,00000000,00000000,00000001), ref: 10002518
                            • PostMessageA.USER32(00008002,?,?), ref: 1000252F
                            • CallWindowProcA.USER32(?,00000047,?,?), ref: 1000254F
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976574315.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                            • Associated: 00000001.00000002.2976553438.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000001.00000002.2976597083.0000000010004000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000001.00000002.2976619836.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_10000000_Au_.jbxd
                            Similarity
                            • API ID: Message$Window$PostSend$CallProcRect
                            • String ID: G
                            • API String ID: 3451797191-985283518
                            • Opcode ID: 8459f72c2daa026aec1874bf85f2df9d616ba527169aa0e9b22aca72aef16451
                            • Instruction ID: 99c4d9ead5a2cc13b400db64e0a072f7776296885c85ac3f57b22d13651e73a2
                            • Opcode Fuzzy Hash: 8459f72c2daa026aec1874bf85f2df9d616ba527169aa0e9b22aca72aef16451
                            • Instruction Fuzzy Hash: 3E2114B6900128BFEF029F94DD85DAA7B79EB083D6F414055FA04A60B4C7718E61EB64
                            APIs
                            • __EH_prolog3.LIBCMT ref: 6E5B6192
                              • Part of subcall function 6E5B5F42: __EH_prolog3_GS.LIBCMT ref: 6E5B5F4C
                              • Part of subcall function 6E5B5F42: CreateToolhelp32Snapshot.KERNEL32 ref: 6E5B5F7B
                              • Part of subcall function 6E5B5F42: _memset.LIBCMT ref: 6E5B5F97
                              • Part of subcall function 6E5B5F42: Process32First.KERNEL32 ref: 6E5B5FB1
                              • Part of subcall function 6E5B5F42: CloseHandle.KERNEL32(00000000,?,00000000,?,6E5B177C,firefox.exe), ref: 6E5B6053
                            • OpenProcess.KERNEL32(00000800,00000000,?,00000014,6E5B2D0E,?), ref: 6E5B61C3
                            • GetModuleHandleA.KERNEL32(ntdll), ref: 6E5B61D4
                            • GetProcAddress.KERNEL32(00000000,NtResumeProcess), ref: 6E5B61F1
                            • CloseHandle.KERNEL32(00000000), ref: 6E5B61FF
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: Handle$Close$AddressCreateFirstH_prolog3H_prolog3_ModuleOpenProcProcessProcess32SnapshotToolhelp32_memset
                            • String ID: NtResumeProcess$NtSuspendProcess$ntdll
                            • API String ID: 1927671803-2625365909
                            • Opcode ID: aed830c2baef7e2ebf119158d0821fd6e69130f66e790c890966ff02b104439a
                            • Instruction ID: 278232f5d9e02925aca3b19927a2a83b89082c581f499383eb2f243b03e2ca45
                            • Opcode Fuzzy Hash: aed830c2baef7e2ebf119158d0821fd6e69130f66e790c890966ff02b104439a
                            • Instruction Fuzzy Hash: 6C019235E1060BABEF158BF8C928FBE76F5AF41305F008568E511E7281DFB4D905CA25
                            APIs
                            • __EH_prolog3.LIBCMT ref: 6E5B5E24
                            • std::_Lockit::_Lockit.LIBCPMT ref: 6E5B5E2E
                              • Part of subcall function 6E5B9775: __lock.LIBCMT ref: 6E5B9786
                            • int.LIBCPMT ref: 6E5B5E45
                              • Part of subcall function 6E5AC730: std::_Lockit::_Lockit.LIBCPMT ref: 6E5AC741
                            • std::locale::_Getfacet.LIBCPMT ref: 6E5B5E4E
                            • std::bad_exception::bad_exception.LIBCMT ref: 6E5B5E7C
                            • __CxxThrowException@8.LIBCMT ref: 6E5B5E8A
                            • std::_Facet_Register.LIBCPMT ref: 6E5B5EA0
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: std::_$LockitLockit::_$Exception@8Facet_GetfacetH_prolog3RegisterThrow__lockstd::bad_exception::bad_exceptionstd::locale::_
                            • String ID: bad cast
                            • API String ID: 1501143699-3145022300
                            • Opcode ID: 08c1a6369d640dd0efc8d5b65954b816619ad8d9edc801dacd1b45c96a54ccfe
                            • Instruction ID: 617c5840697e8280a1191ed9a354e51710ae71f12ac14d62ec8fb2d26e20383b
                            • Opcode Fuzzy Hash: 08c1a6369d640dd0efc8d5b65954b816619ad8d9edc801dacd1b45c96a54ccfe
                            • Instruction Fuzzy Hash: 5F019276D106299BCF09DFE4C920EFD33F9AF94B54F100949E611AB290DF349E058791
                            APIs
                            • __EH_prolog3.LIBCMT ref: 6E5B8EDD
                            • std::_Lockit::_Lockit.LIBCPMT ref: 6E5B8EE7
                              • Part of subcall function 6E5B9775: __lock.LIBCMT ref: 6E5B9786
                            • int.LIBCPMT ref: 6E5B8EFE
                              • Part of subcall function 6E5AC730: std::_Lockit::_Lockit.LIBCPMT ref: 6E5AC741
                            • std::locale::_Getfacet.LIBCPMT ref: 6E5B8F07
                            • std::bad_exception::bad_exception.LIBCMT ref: 6E5B8F35
                            • __CxxThrowException@8.LIBCMT ref: 6E5B8F43
                            • std::_Facet_Register.LIBCPMT ref: 6E5B8F59
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: std::_$LockitLockit::_$Exception@8Facet_GetfacetH_prolog3RegisterThrow__lockstd::bad_exception::bad_exceptionstd::locale::_
                            • String ID: bad cast
                            • API String ID: 1501143699-3145022300
                            • Opcode ID: 2edc3a9c3dedd52989cbf0fad327807ac8267756efb11dd90a531e9ffe1458c5
                            • Instruction ID: b26368d946f20402b2fcc18d6a2f68e027add18d7a63a21ba2eb0e96cd03ad94
                            • Opcode Fuzzy Hash: 2edc3a9c3dedd52989cbf0fad327807ac8267756efb11dd90a531e9ffe1458c5
                            • Instruction Fuzzy Hash: 8701B5369006269BCF15DFE4C960DED73F9AF94714F100949E711AB2D0DF349E048B92
                            APIs
                            • __EH_prolog3.LIBCMT ref: 6E5A8BA4
                            • std::_Lockit::_Lockit.LIBCPMT ref: 6E5A8BAE
                              • Part of subcall function 6E5B9775: __lock.LIBCMT ref: 6E5B9786
                            • int.LIBCPMT ref: 6E5A8BC5
                              • Part of subcall function 6E5AC730: std::_Lockit::_Lockit.LIBCPMT ref: 6E5AC741
                            • std::locale::_Getfacet.LIBCPMT ref: 6E5A8BCE
                            • std::bad_exception::bad_exception.LIBCMT ref: 6E5A8BFC
                            • __CxxThrowException@8.LIBCMT ref: 6E5A8C0A
                            • std::_Facet_Register.LIBCPMT ref: 6E5A8C20
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: std::_$LockitLockit::_$Exception@8Facet_GetfacetH_prolog3RegisterThrow__lockstd::bad_exception::bad_exceptionstd::locale::_
                            • String ID: bad cast
                            • API String ID: 1501143699-3145022300
                            • Opcode ID: 25a1e9f8a88de8c8aad06f0b03d67caa4048a3fdd21d32497e5f00ad1f5f199c
                            • Instruction ID: ef62dfe2a88ca418d82be09e97ae5ad2b6d62a4fc5e3f88d8d7211f08e206e64
                            • Opcode Fuzzy Hash: 25a1e9f8a88de8c8aad06f0b03d67caa4048a3fdd21d32497e5f00ad1f5f199c
                            • Instruction Fuzzy Hash: 6901807A9106199BCB15DBE8C924AED73F8AF94714F104909D711AF2D0EF349E048B92
                            APIs
                            • __EH_prolog3.LIBCMT ref: 6E5B4BAA
                            • std::_Lockit::_Lockit.LIBCPMT ref: 6E5B4BB4
                              • Part of subcall function 6E5B9775: __lock.LIBCMT ref: 6E5B9786
                            • int.LIBCPMT ref: 6E5B4BCB
                              • Part of subcall function 6E5AC730: std::_Lockit::_Lockit.LIBCPMT ref: 6E5AC741
                            • std::locale::_Getfacet.LIBCPMT ref: 6E5B4BD4
                            • std::bad_exception::bad_exception.LIBCMT ref: 6E5B4C02
                            • __CxxThrowException@8.LIBCMT ref: 6E5B4C10
                            • std::_Facet_Register.LIBCPMT ref: 6E5B4C26
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: std::_$LockitLockit::_$Exception@8Facet_GetfacetH_prolog3RegisterThrow__lockstd::bad_exception::bad_exceptionstd::locale::_
                            • String ID: bad cast
                            • API String ID: 1501143699-3145022300
                            • Opcode ID: fc74ca5582b2c1fea5fc744b5d3ab6717e5ff677a84fe9258ecc915b80bb6807
                            • Instruction ID: 6d5d2077bb1874829faecede2add4ca5b80996c659cd394f3e67405c7ad8bd77
                            • Opcode Fuzzy Hash: fc74ca5582b2c1fea5fc744b5d3ab6717e5ff677a84fe9258ecc915b80bb6807
                            • Instruction Fuzzy Hash: 9E01527A9006199BCF15DBE4C920AED73FCAF84B19F104D09D711AB291EF749E068B91
                            APIs
                            • GetCurrentProcessId.KERNEL32 ref: 10001E5B
                            • GetCurrentThreadId.KERNEL32 ref: 10001E61
                            • SendMessageA.USER32(00000010,00000000,00000000), ref: 10001E89
                            • WaitForSingleObject.KERNEL32(000000FF), ref: 10001E97
                            • CloseHandle.KERNEL32 ref: 10001EA3
                            • CloseHandle.KERNEL32 ref: 10001EAB
                            • CloseHandle.KERNEL32 ref: 10001EB3
                            • UnmapViewOfFile.KERNEL32 ref: 10001EBB
                            • CloseHandle.KERNEL32 ref: 10001EC7
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976574315.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                            • Associated: 00000001.00000002.2976553438.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000001.00000002.2976597083.0000000010004000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000001.00000002.2976619836.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_10000000_Au_.jbxd
                            Similarity
                            • API ID: CloseHandle$Current$FileMessageObjectProcessSendSingleThreadUnmapViewWait
                            • String ID:
                            • API String ID: 1555270478-0
                            • Opcode ID: f543bcc34b0980035e4ef67c28abe85c994fd5068d6c0a6fe188832442d89939
                            • Instruction ID: 2d581c138c8a5662fdd2d931458bdd3db3c3346f56e31af900759cc14978b0eb
                            • Opcode Fuzzy Hash: f543bcc34b0980035e4ef67c28abe85c994fd5068d6c0a6fe188832442d89939
                            • Instruction Fuzzy Hash: FFF0D4B14100B4AFFB116B70CD89A9A3FB6FB083E2B025626F545910BDDFA10A90EF54
                            APIs
                            • __EH_prolog3_GS.LIBCMT ref: 6E5B622D
                            • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 6E5B6297
                            • Process32First.KERNEL32(00000000,00000128), ref: 6E5B62A7
                            • Process32Next.KERNEL32(00000000,00000128), ref: 6E5B62C4
                              • Part of subcall function 6E5A57E7: __EH_prolog3.LIBCMT ref: 6E5A57EE
                              • Part of subcall function 6E5A57E7: std::locale::_Init.LIBCPMT ref: 6E5A5806
                              • Part of subcall function 6E5A5A50: __EH_prolog3_GS.LIBCMT ref: 6E5A5A57
                            • CloseHandle.KERNEL32(00000000), ref: 6E5B6391
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: H_prolog3_Process32$CloseCreateFirstH_prolog3HandleInitNextSnapshotToolhelp32std::locale::_
                            • String ID: .exe$[^a-zA-Z0-9 _-]+
                            • API String ID: 3459797796-2008357110
                            • Opcode ID: a5a5605de3af12f7d2fa7f54ebefcb477b3a9d55133075497bd518824cabd468
                            • Instruction ID: 1f5ab53c0909d3b5059f82a1c381141a6bf817749f33f011d3f836e787eaf361
                            • Opcode Fuzzy Hash: a5a5605de3af12f7d2fa7f54ebefcb477b3a9d55133075497bd518824cabd468
                            • Instruction Fuzzy Hash: F7513BB1901218AFDB15DFE8CEA0AEEB7F8AF55304F5044A9D209A7241DF706E49CF61
                            APIs
                            • GetClassNameA.USER32(?,?,00000200), ref: 6E5A115F
                            • _memcmp.LIBCMT ref: 6E5A1177
                            • FindWindowExA.USER32(?,00000000,MozillaWindowClass,00000000), ref: 6E5A118F
                            • SetForegroundWindow.USER32(00000000), ref: 6E5A119D
                            • SendMessageTimeoutA.USER32(00000000,00000100,0000000D,00000000,00000003,000003E8,00000000), ref: 6E5A11B4
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: Window$ClassFindForegroundMessageNameSendTimeout_memcmp
                            • String ID: MozillaDialogClass$MozillaWindowClass
                            • API String ID: 846749858-3318280321
                            • Opcode ID: 9b056d88dcb0001b4d2d6733e2869fd92e5dd893df904deae64da5c3a22e0040
                            • Instruction ID: 9110683cfef78d44704040a3f6c6060361fdd2e15f1fb8c4b8370c77b3df0040
                            • Opcode Fuzzy Hash: 9b056d88dcb0001b4d2d6733e2869fd92e5dd893df904deae64da5c3a22e0040
                            • Instruction Fuzzy Hash: 9C01FCB260071D7BE700EBE58D89FBF77ECDB45744F410015FA01E6182DB709D0586A5
                            APIs
                            • LoadLibraryA.KERNEL32(KERNEL32,CheckElevationEnabled,?,?,?,10002C53), ref: 10001BA4
                            • GetProcAddress.KERNEL32(00000000), ref: 10001BAB
                            • SHGetValueA.SHLWAPI(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\System,EnableLUA,?,?,?), ref: 10001BE9
                            Strings
                            • Software\Microsoft\Windows\CurrentVersion\Policies\System, xrefs: 10001BDF
                            • CheckElevationEnabled, xrefs: 10001B9A
                            • EnableLUA, xrefs: 10001BDA
                            • KERNEL32, xrefs: 10001B9F
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976574315.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                            • Associated: 00000001.00000002.2976553438.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000001.00000002.2976597083.0000000010004000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000001.00000002.2976619836.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_10000000_Au_.jbxd
                            Similarity
                            • API ID: AddressLibraryLoadProcValue
                            • String ID: CheckElevationEnabled$EnableLUA$KERNEL32$Software\Microsoft\Windows\CurrentVersion\Policies\System
                            • API String ID: 426837892-266755506
                            • Opcode ID: 9e5a964a85ffe764e2553f4ba1604b097192ed9a3a93ba8720365e3ee3a8bdd9
                            • Instruction ID: bc842063b41881986b8ec85f5135a6cd47f968694aa42c3c231e6defe1fa76fc
                            • Opcode Fuzzy Hash: 9e5a964a85ffe764e2553f4ba1604b097192ed9a3a93ba8720365e3ee3a8bdd9
                            • Instruction Fuzzy Hash: ECF030B1A0020ABBFB00DBB0CD85ADF77FCEB042C5F014169B652E1049FF74D6408A55
                            APIs
                            • __mtinitlocknum.LIBCMT ref: 6E5D257E
                              • Part of subcall function 6E5C21E0: __FF_MSGBANNER.LIBCMT ref: 6E5C21F5
                              • Part of subcall function 6E5C21E0: __NMSG_WRITE.LIBCMT ref: 6E5C21FC
                              • Part of subcall function 6E5C21E0: __malloc_crt.LIBCMT ref: 6E5C221C
                            • __lock.LIBCMT ref: 6E5D2591
                            • __lock.LIBCMT ref: 6E5D25DD
                            • InitializeCriticalSectionAndSpinCount.KERNEL32(8000000C,00000FA0,6E5E4878,00000018,6E5D3F9B,?,00000000,00000109), ref: 6E5D25F9
                            • EnterCriticalSection.KERNEL32(8000000C,6E5E4878,00000018,6E5D3F9B,?,00000000,00000109), ref: 6E5D2616
                            • LeaveCriticalSection.KERNEL32(8000000C), ref: 6E5D2626
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: CriticalSection$__lock$CountEnterInitializeLeaveSpin__malloc_crt__mtinitlocknum
                            • String ID:
                            • API String ID: 1422805418-0
                            • Opcode ID: 6d2e252fe2db3fe80d285ffd4a01ff0d26618f766f58f44ca5b8a6c907926617
                            • Instruction ID: 253c32a8b0cd71a5807c1f3c57cf08d5dde2c091011b3bde4309fefb4a074986
                            • Opcode Fuzzy Hash: 6d2e252fe2db3fe80d285ffd4a01ff0d26618f766f58f44ca5b8a6c907926617
                            • Instruction Fuzzy Hash: AB411379A04B0A8BEB508FECC94479CB7F4BF06329F118218D525EB2C0DF749949CB89
                            APIs
                            • GetWindowLongA.USER32(?,000000EB), ref: 00403F9C
                            • GetSysColor.USER32(00000000), ref: 00403FB8
                            • SetTextColor.GDI32(?,00000000), ref: 00403FC4
                            • SetBkMode.GDI32(?,?), ref: 00403FD0
                            • GetSysColor.USER32(?), ref: 00403FE3
                            • SetBkColor.GDI32(?,?), ref: 00403FF3
                            • DeleteObject.GDI32(?), ref: 0040400D
                            • CreateBrushIndirect.GDI32(?), ref: 00404017
                            Memory Dump Source
                            • Source File: 00000001.00000002.2972549926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000001.00000002.2972517186.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972577518.0000000000407000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000409000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000413000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000416000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000041F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000046F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972789889.000000000052B000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_400000_Au_.jbxd
                            Similarity
                            • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                            • String ID:
                            • API String ID: 2320649405-0
                            • Opcode ID: 54c4c26d0880f537c7164b4e2121e342b47f232b14c6c2566c024284623f766e
                            • Instruction ID: 4cc26f8bf5fc777f430f8318c3ba194748f169832e683f7fcd21add738ba3f9d
                            • Opcode Fuzzy Hash: 54c4c26d0880f537c7164b4e2121e342b47f232b14c6c2566c024284623f766e
                            • Instruction Fuzzy Hash: C221C371904705ABCB209F78DD08B4BBBF8AF40711F048A29F992F26E0C738E904CB55
                            APIs
                              • Part of subcall function 6E5C9287: __getptd_noexit.LIBCMT ref: 6E5C9288
                              • Part of subcall function 6E5C9287: __amsg_exit.LIBCMT ref: 6E5C9295
                            • _wcscmp.LIBCMT ref: 6E5CA20B
                            • _wcscmp.LIBCMT ref: 6E5CA221
                            • ___lc_wcstolc.LIBCMT ref: 6E5CA24D
                            • ___get_qualified_locale.LIBCMT ref: 6E5CA272
                              • Part of subcall function 6E5D1AE0: _TranslateName.LIBCMT ref: 6E5D1B20
                              • Part of subcall function 6E5D1AE0: _GetLocaleNameFromLangCountry.LIBCMT ref: 6E5D1B39
                              • Part of subcall function 6E5D1AE0: _TranslateName.LIBCMT ref: 6E5D1B54
                              • Part of subcall function 6E5D1AE0: _GetLocaleNameFromLangCountry.LIBCMT ref: 6E5D1B6A
                              • Part of subcall function 6E5D1AE0: IsValidCodePage.KERNEL32(00000000,?,?,00000055,?,?,6E5CA277,?,?,?,?,00000004,?,00000000), ref: 6E5D1BBE
                            • GetACP.KERNEL32(?,?,?,?,?,00000004,?,00000000), ref: 6E5CA309
                            • _memmove.LIBCMT ref: 6E5CA3BF
                            • __invoke_watson.LIBCMT ref: 6E5CA414
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: Name$CountryFromLangLocaleTranslate_wcscmp$CodePageValid___get_qualified_locale___lc_wcstolc__amsg_exit__getptd_noexit__invoke_watson_memmove
                            • String ID:
                            • API String ID: 3739364018-0
                            • Opcode ID: c79002f3d39b25a9c68898f5f9d4826e5d3c38be24b761779524e32f00092169
                            • Instruction ID: 999941aa069e4f82c4a2eca9c921b60709b50164c6f44718c9dbc8088a1076fd
                            • Opcode Fuzzy Hash: c79002f3d39b25a9c68898f5f9d4826e5d3c38be24b761779524e32f00092169
                            • Instruction Fuzzy Hash: 0B71C7719002556BDB118AD5DC60BFF7BFDAF85B04F1044ADED0AE2142EB308E85CB62
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: _memmove
                            • String ID: vector<T> too long
                            • API String ID: 4104443479-3788999226
                            • Opcode ID: 948b618ad9eba6f91bb8875efbf400dffc147a585fc72f4580284d7ec8918ce3
                            • Instruction ID: 85cb227618d49a3916a766dac3afc238693eff6e1201f271ba9ba5319b5cbdd7
                            • Opcode Fuzzy Hash: 948b618ad9eba6f91bb8875efbf400dffc147a585fc72f4580284d7ec8918ce3
                            • Instruction Fuzzy Hash: 9C617072A00125DFCF04CFACCDA499E77E6EF893147198669EA159B388D730EE10CB90
                            APIs
                            • __EH_prolog3_GS.LIBCMT ref: 6E5ACD29
                            • VariantClear.OLEAUT32 ref: 6E5ACD3E
                            • __alloca_probe_16.LIBCMT ref: 6E5ACDA2
                            • _malloc.LIBCMT ref: 6E5ACDBC
                            • MultiByteToWideChar.KERNEL32(00000003,00000000,00000000,000000FF,-00000008,00000002,?,00000014,6E5AD32F,?), ref: 6E5ACDE8
                            • SysAllocString.OLEAUT32(00000000), ref: 6E5ACDFB
                            • _free.LIBCMT ref: 6E5ACE2D
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: AllocByteCharClearH_prolog3_MultiStringVariantWide__alloca_probe_16_free_malloc
                            • String ID:
                            • API String ID: 2957485059-0
                            • Opcode ID: 2102e232680884829ded343d71ef0c16728e638d87ad005f71c95b1b2894ea88
                            • Instruction ID: 8ef366036e7fac8226c836d503b1d394cfb30e2ae7dd0a925f50398ab8ac245e
                            • Opcode Fuzzy Hash: 2102e232680884829ded343d71ef0c16728e638d87ad005f71c95b1b2894ea88
                            • Instruction Fuzzy Hash: C131E271A102468BDF118FECC8A07AD7BF9AF85324F15856AE715FF290EB31884587A1
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: _memmove$Allocate
                            • String ID: vector<T> too long
                            • API String ID: 164242391-3788999226
                            • Opcode ID: 6977f17c7d94bf2a6e313e734a024463cefe471bbd512a2ccd44e11c94f7469e
                            • Instruction ID: 0d05d2889a5048e1f5a8e41e8047f5bb3a813d2412ca50d1656bb84a73ab81fc
                            • Opcode Fuzzy Hash: 6977f17c7d94bf2a6e313e734a024463cefe471bbd512a2ccd44e11c94f7469e
                            • Instruction Fuzzy Hash: A63174B1600216AFCB04DFECCD949AEBBEDFF44258B10492DE6199B601DB71ED60CB94
                            APIs
                            • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,000000F0), ref: 004026D0
                            • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,000000F0), ref: 004026EC
                            • GlobalFree.KERNEL32(?), ref: 00402725
                            • WriteFile.KERNEL32(FFFFFD66,00000000,?,FFFFFD66,?,?,?,?,000000F0), ref: 00402737
                            • GlobalFree.KERNEL32(00000000), ref: 0040273E
                            • CloseHandle.KERNEL32(FFFFFD66,?,?,000000F0), ref: 00402756
                            • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,000000F0), ref: 0040276A
                            Memory Dump Source
                            • Source File: 00000001.00000002.2972549926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000001.00000002.2972517186.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972577518.0000000000407000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000409000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000413000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000416000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000041F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000046F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972789889.000000000052B000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_400000_Au_.jbxd
                            Similarity
                            • API ID: Global$AllocFileFree$CloseDeleteHandleWrite
                            • String ID:
                            • API String ID: 3294113728-0
                            • Opcode ID: 5fcc8b9a382b72ce3edcc9f0536c3aea7bfda514bb8596ce6868823b37202457
                            • Instruction ID: 139215c225530ed05a72f165aec94188ca6d0ffd2e2debb4f1ded45b97d75f17
                            • Opcode Fuzzy Hash: 5fcc8b9a382b72ce3edcc9f0536c3aea7bfda514bb8596ce6868823b37202457
                            • Instruction Fuzzy Hash: BF31AD71C00128BBDF216FA4CD89DAE7E78EF09364F10423AF920772E0C6795D419BA9
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: _memmove
                            • String ID: Win32_ScheduledJob=$string too long$Zn$Zn
                            • API String ID: 4104443479-1486525531
                            • Opcode ID: 5fa5ef3b41922c5325550343904a245c82a44bae78e9635dbb46abd23e4cb7ae
                            • Instruction ID: b72f918f9bac703cc40b4e32998f0b855633a9202c8e5635308a974a052625ca
                            • Opcode Fuzzy Hash: 5fa5ef3b41922c5325550343904a245c82a44bae78e9635dbb46abd23e4cb7ae
                            • Instruction Fuzzy Hash: 6521D3782057019BD730DE9F8D61A5FB7E9FB45704B000D1DEAA287680EB71DC44CB91
                            APIs
                            Strings
                            • AllocatorBase: requested size would cause integer overflow, xrefs: 6E5A2350, 6E5A23E1
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: Exception@8H_prolog3_Throw_free_memcpy_s
                            • String ID: AllocatorBase: requested size would cause integer overflow
                            • API String ID: 2762394883-10355266
                            • Opcode ID: 5ab245504a1f794069785c666c4a5610daa80ee9dad406b7a71d4396b167053f
                            • Instruction ID: 15fc60f73f0d865b67fa33f509ec7b01be44389ef7eb9bdc4e22d21dc740686a
                            • Opcode Fuzzy Hash: 5ab245504a1f794069785c666c4a5610daa80ee9dad406b7a71d4396b167053f
                            • Instruction Fuzzy Hash: 9A31C071E00118EFCF14CFEAC961BED77F89B45358F008869E718AB681DB309E498B91
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: _memmove$Allocate
                            • String ID: u~Zn$u~Zn$vector<T> too long
                            • API String ID: 164242391-2961771269
                            • Opcode ID: 10bc0442d80ce10b7427d418a32dd2cbdce6dceb1fbf44c9d6eca5294cf7cc61
                            • Instruction ID: a63172b6f0fb2d0348690718d17d8e7b41f5c2f1da84e276040d0932605c955c
                            • Opcode Fuzzy Hash: 10bc0442d80ce10b7427d418a32dd2cbdce6dceb1fbf44c9d6eca5294cf7cc61
                            • Instruction Fuzzy Hash: B021FFB250010ABFCB04DFEDCD94D9EBBE9FF48244B104529E6199B614EB71E964CB90
                            APIs
                            • lstrlenA.KERNEL32(0042DC78,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C4A,00000000,?), ref: 00404F3D
                            • lstrlenA.KERNEL32(00402C4A,0042DC78,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C4A,00000000), ref: 00404F4D
                            • lstrcatA.KERNEL32(0042DC78,00402C4A,00402C4A,0042DC78,00000000,00000000,00000000), ref: 00404F60
                            • SetWindowTextA.USER32(0042DC78,0042DC78), ref: 00404F72
                            • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404F98
                            • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404FB2
                            • SendMessageA.USER32(?,00001013,?,00000000), ref: 00404FC0
                            Memory Dump Source
                            • Source File: 00000001.00000002.2972549926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000001.00000002.2972517186.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972577518.0000000000407000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000409000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000413000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000416000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000041F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000046F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972789889.000000000052B000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_400000_Au_.jbxd
                            Similarity
                            • API ID: MessageSend$lstrlen$TextWindowlstrcat
                            • String ID:
                            • API String ID: 2531174081-0
                            • Opcode ID: 44fc4a0ccf7bdfb88c8bbdc0bfee12d1c7f283ea044d1b2c3ed86b30a2e5f05c
                            • Instruction ID: 2fc55b577d604e71a684dab85a3a394c861f11f73c7a4afdaccd6d4ddf25b775
                            • Opcode Fuzzy Hash: 44fc4a0ccf7bdfb88c8bbdc0bfee12d1c7f283ea044d1b2c3ed86b30a2e5f05c
                            • Instruction Fuzzy Hash: 98218CB1900119BBDB019FA5DD8499EBFB9EF49354F14807AFA04B6290C3789E40CB68
                            APIs
                            • CharNextA.USER32(?,*?|<>/":,00000000,00479000,"C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exe" ,00479000,00000000,00403214,00479000,00000000,00403386), ref: 00405E20
                            • CharNextA.USER32(?,?,?,00000000), ref: 00405E2D
                            • CharNextA.USER32(?,00479000,"C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exe" ,00479000,00000000,00403214,00479000,00000000,00403386), ref: 00405E32
                            • CharPrevA.USER32(?,?,"C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exe" ,00479000,00000000,00403214,00479000,00000000,00403386), ref: 00405E42
                            Strings
                            • *?|<>/":, xrefs: 00405E10
                            • "C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exe" , xrefs: 00405DCE
                            Memory Dump Source
                            • Source File: 00000001.00000002.2972549926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000001.00000002.2972517186.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972577518.0000000000407000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000409000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000413000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000416000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000041F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000046F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972789889.000000000052B000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_400000_Au_.jbxd
                            Similarity
                            • API ID: Char$Next$Prev
                            • String ID: "C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exe" $*?|<>/":
                            • API String ID: 589700163-3667067411
                            • Opcode ID: d60fa47d96b079028a76cfcdb2d30976ede71f36b1f4f1e1bc9c50cb25bd2be5
                            • Instruction ID: 3b6179abbfe29fc78842bf11aa846075366cc437f950451d76d565b88bc2b460
                            • Opcode Fuzzy Hash: d60fa47d96b079028a76cfcdb2d30976ede71f36b1f4f1e1bc9c50cb25bd2be5
                            • Instruction Fuzzy Hash: A0110861805B9129EB3227284C48BBB7F89CF66754F18447FD8C4722C2C67C5D429FAD
                            APIs
                            • RegOpenKeyExA.ADVAPI32(80000002,SOFTWARE\Microsoft\.NETFramework\policy,00000000,00020019,?), ref: 6E5A3CE4
                            • RegEnumKeyExA.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 6E5A3D4E
                            • RegCloseKey.ADVAPI32(?), ref: 6E5A3D62
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: CloseEnumOpen
                            • String ID: .$SOFTWARE\Microsoft\.NETFramework\policy$v
                            • API String ID: 1332880857-3848217630
                            • Opcode ID: abcc3562479d19e9402f57a5b99fdc530f558a8bdba8117313c39061c1ae5a00
                            • Instruction ID: 5c7eb403660da81fc72b6189a1307481c2bebc02379e01f62617a3eef7ebc33f
                            • Opcode Fuzzy Hash: abcc3562479d19e9402f57a5b99fdc530f558a8bdba8117313c39061c1ae5a00
                            • Instruction Fuzzy Hash: 582148B190411DEEEB608B95CC98FEF77FCEB16348F0041E6E285A6101DAB45EC48F50
                            APIs
                            • DestroyWindow.USER32(00000000,00000000), ref: 00402BEB
                            • GetTickCount.KERNEL32 ref: 00402C09
                            • wsprintfA.USER32 ref: 00402C37
                              • Part of subcall function 00404F04: lstrlenA.KERNEL32(0042DC78,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C4A,00000000,?), ref: 00404F3D
                              • Part of subcall function 00404F04: lstrlenA.KERNEL32(00402C4A,0042DC78,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C4A,00000000), ref: 00404F4D
                              • Part of subcall function 00404F04: lstrcatA.KERNEL32(0042DC78,00402C4A,00402C4A,0042DC78,00000000,00000000,00000000), ref: 00404F60
                              • Part of subcall function 00404F04: SetWindowTextA.USER32(0042DC78,0042DC78), ref: 00404F72
                              • Part of subcall function 00404F04: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404F98
                              • Part of subcall function 00404F04: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404FB2
                              • Part of subcall function 00404F04: SendMessageA.USER32(?,00001013,?,00000000), ref: 00404FC0
                            • CreateDialogParamA.USER32(0000006F,00000000,00402B3B,00000000), ref: 00402C5B
                            • ShowWindow.USER32(00000000,00000005), ref: 00402C69
                              • Part of subcall function 00402BB7: MulDiv.KERNEL32(00052CBE,00000064,0004DE23), ref: 00402BCC
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2972549926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000001.00000002.2972517186.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972577518.0000000000407000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000409000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000413000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000416000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000041F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000046F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972789889.000000000052B000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_400000_Au_.jbxd
                            Similarity
                            • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                            • String ID: ... %d%%
                            • API String ID: 722711167-2449383134
                            • Opcode ID: 02cd7cf1b4c9dc1e06d43a13f06a46c1327bce63474e00e6603fffb3150c81e6
                            • Instruction ID: d503382bffdb6877589bf5e9d8f4d3b6a3320859dd1babf1ed2f4cbaa8b03d3e
                            • Opcode Fuzzy Hash: 02cd7cf1b4c9dc1e06d43a13f06a46c1327bce63474e00e6603fffb3150c81e6
                            • Instruction Fuzzy Hash: 2501A170809214EBD7219F61EE4DA9F77A8BB01701B10403BF901F11E9DAB89901DBEF
                            APIs
                            • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 004047EE
                            • GetMessagePos.USER32 ref: 004047F6
                            • ScreenToClient.USER32(?,?), ref: 00404810
                            • SendMessageA.USER32(?,00001111,00000000,?), ref: 00404822
                            • SendMessageA.USER32(?,0000110C,00000000,?), ref: 00404848
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2972549926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000001.00000002.2972517186.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972577518.0000000000407000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000409000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000413000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000416000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000041F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000046F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972789889.000000000052B000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_400000_Au_.jbxd
                            Similarity
                            • API ID: Message$Send$ClientScreen
                            • String ID: f
                            • API String ID: 41195575-1993550816
                            • Opcode ID: 2a5698d5089c35727aab5c3c5da7bcfb0b51a0b1d2cb1bbeaafe9db8233e3477
                            • Instruction ID: 01d6173a61c3c3b4b037133c9a52f1e04ee3049876a8ff08b59bebc5d15cf036
                            • Opcode Fuzzy Hash: 2a5698d5089c35727aab5c3c5da7bcfb0b51a0b1d2cb1bbeaafe9db8233e3477
                            • Instruction Fuzzy Hash: BA018075D40218BADB00DB94CC41BFEBBBCAB55711F10412ABB00B61C0C3B46501CB95
                            APIs
                            • GetClassNameA.USER32(?,?,00000200), ref: 6E5A107D
                            • _memcmp.LIBCMT ref: 6E5A1095
                            • FindWindowExA.USER32(?,00000000,TabWindowClass,00000000), ref: 6E5A10AC
                            • PostMessageA.USER32(00000000,00000010,00000000,00000000), ref: 6E5A10BB
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: ClassFindMessageNamePostWindow_memcmp
                            • String ID: Frame Tab$TabWindowClass
                            • API String ID: 2748079166-2714809625
                            • Opcode ID: f78bb11b2bfca3f79520b4044f1d63cc47b3179b215326aaf923ac7990b6b83c
                            • Instruction ID: c960991b6627d0ea600ff4551fb1211fc4a9bd512fa3087749c59689d750af5f
                            • Opcode Fuzzy Hash: f78bb11b2bfca3f79520b4044f1d63cc47b3179b215326aaf923ac7990b6b83c
                            • Instruction Fuzzy Hash: 0A0181B1600249BBEB10ABA68D08E9F76ECAB86704F414459BA11E6181EB349948CA65
                            APIs
                            • GetClassNameA.USER32(?,?,00000200), ref: 6E5A11F2
                            • _memcmp.LIBCMT ref: 6E5A120A
                            • _memcmp.LIBCMT ref: 6E5A1224
                            • PostMessageA.USER32(?,00000010,00000000,00000000), ref: 6E5A1237
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: _memcmp$ClassMessageNamePost
                            • String ID: MozillaUIWindowClass$MozillaWindowClass
                            • API String ID: 2291821972-3194403505
                            • Opcode ID: 93a0d3fd77e18eb6909ef942d395fe11afe69efbf5920a02941218efad30a3ae
                            • Instruction ID: f5cb00be090a5fb828450e20d8c8fcb7caec3d3308c24709e6f1978afff26b74
                            • Opcode Fuzzy Hash: 93a0d3fd77e18eb6909ef942d395fe11afe69efbf5920a02941218efad30a3ae
                            • Instruction Fuzzy Hash: E70181B2A0031D76EB00EBE58D09FDF32EC9F05704F404465EB10E61C2EB70EA088A59
                            APIs
                            • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402B56
                            • wsprintfA.USER32 ref: 00402B8A
                            • SetWindowTextA.USER32(?,?), ref: 00402B9A
                            • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402BAC
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2972549926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000001.00000002.2972517186.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972577518.0000000000407000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000409000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000413000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000416000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000041F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000046F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972789889.000000000052B000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_400000_Au_.jbxd
                            Similarity
                            • API ID: Text$ItemTimerWindowwsprintf
                            • String ID: unpacking data: %d%%$verifying installer: %d%%
                            • API String ID: 1451636040-1158693248
                            • Opcode ID: 9af37322b4a8c4315db75c794ccca9b4a5d46a3d1f417319ca6675d20cac232d
                            • Instruction ID: 42736c47b098eae16a91b662ba86b6af227696c677de4a6351d43f215c84d625
                            • Opcode Fuzzy Hash: 9af37322b4a8c4315db75c794ccca9b4a5d46a3d1f417319ca6675d20cac232d
                            • Instruction Fuzzy Hash: 86F03671900109ABEF259F51DD0ABEE3779EB00305F008036FA05B51D1D7F9AA559F99
                            APIs
                            • __EH_prolog3_GS.LIBCMT ref: 6E5B5F4C
                            • CreateToolhelp32Snapshot.KERNEL32 ref: 6E5B5F7B
                            • _memset.LIBCMT ref: 6E5B5F97
                            • Process32First.KERNEL32 ref: 6E5B5FB1
                            • Process32Next.KERNEL32(00000000,?), ref: 6E5B6044
                            • CloseHandle.KERNEL32(00000000,?,00000000,?,6E5B177C,firefox.exe), ref: 6E5B6053
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: Process32$CloseCreateFirstH_prolog3_HandleNextSnapshotToolhelp32_memset
                            • String ID:
                            • API String ID: 1658010742-0
                            • Opcode ID: 8e5130b28a17386571c1f131f838a5f264e0926edde52550bab66d33785288d8
                            • Instruction ID: a4b9a267d4f4af008caf0d29f1c18b1accaffc2181032adf4839f6873cfe5557
                            • Opcode Fuzzy Hash: 8e5130b28a17386571c1f131f838a5f264e0926edde52550bab66d33785288d8
                            • Instruction Fuzzy Hash: 4E31B0B0A10309CFDB64CFA5C8A0BAAB3F9AF44704F1044ADE60DD7240D7B4AE84CB41
                            APIs
                            • GetDlgItem.USER32(?,000003E8), ref: 100014B9
                            • SendMessageA.USER32(00000000), ref: 100014C2
                            • GetDlgItem.USER32(?,000003E9), ref: 100014DB
                            • SendMessageA.USER32(00000000), ref: 100014DE
                            • GetDlgItem.USER32(000003EF,000003EC), ref: 10001508
                            • EnableWindow.USER32(00000000), ref: 1000150B
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976574315.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                            • Associated: 00000001.00000002.2976553438.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000001.00000002.2976597083.0000000010004000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000001.00000002.2976619836.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_10000000_Au_.jbxd
                            Similarity
                            • API ID: Item$MessageSend$EnableWindow
                            • String ID:
                            • API String ID: 2158911739-0
                            • Opcode ID: d1a084a767706afaab5881c04c316720801fd502cffe88eaf5a56bb77e4cf56d
                            • Instruction ID: 8a4dafba77292c4870ec695e511580d61b0590fae370932de45dfa44761696c9
                            • Opcode Fuzzy Hash: d1a084a767706afaab5881c04c316720801fd502cffe88eaf5a56bb77e4cf56d
                            • Instruction Fuzzy Hash: 80115A71A00258BFEF029FA5CC84AEE7F6DEB40390F05C426F9149A1A1C6748A51DF90
                            APIs
                            • IsDialogMessageA.USER32(00000002,?), ref: 10001EF1
                            • TranslateMessage.USER32(?), ref: 10001EFF
                            • DispatchMessageA.USER32(?), ref: 10001F09
                            • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 10001F18
                            • GetCurrentProcessId.KERNEL32 ref: 10001F24
                            • GetCurrentThreadId.KERNEL32 ref: 10001F2A
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976574315.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                            • Associated: 00000001.00000002.2976553438.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000001.00000002.2976597083.0000000010004000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000001.00000002.2976619836.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_10000000_Au_.jbxd
                            Similarity
                            • API ID: Message$Current$DialogDispatchPeekProcessThreadTranslate
                            • String ID:
                            • API String ID: 1591844402-0
                            • Opcode ID: b3ce90603388d15316c959500f60e2c52d6493ac26b50c921af3921bbe88ae36
                            • Instruction ID: b95f15e9417dbd24bf6e8ac0690e862ae9fd9ff28d6ada3afbae69be3c1ac41b
                            • Opcode Fuzzy Hash: b3ce90603388d15316c959500f60e2c52d6493ac26b50c921af3921bbe88ae36
                            • Instruction Fuzzy Hash: FA01487190019AEBEB10DFA5CC84CEF7BFDEB856C1B108436F946D2118D7749985CB60
                            APIs
                            • __init_pointers.LIBCMT ref: 6E5C93C1
                              • Part of subcall function 6E5C5C6F: __initp_misc_winsig.LIBCMT ref: 6E5C5C93
                            • __mtinitlocks.LIBCMT ref: 6E5C93C6
                              • Part of subcall function 6E5C2287: InitializeCriticalSectionAndSpinCount.KERNEL32(6E5E85E0,00000FA0,?,00000001,6E5C93CB,6E5C021C,6E5E4370,00000008,6E5C03E2,?,00000001,?,6E5E4390,0000000C,6E5C0381,?), ref: 6E5C22A5
                            • __mtterm.LIBCMT ref: 6E5C93CF
                            • __calloc_crt.LIBCMT ref: 6E5C93F4
                            • GetCurrentThreadId.KERNEL32 ref: 6E5C941D
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: CountCriticalCurrentInitializeSectionSpinThread__calloc_crt__init_pointers__initp_misc_winsig__mtinitlocks__mtterm
                            • String ID:
                            • API String ID: 4019585109-0
                            • Opcode ID: ce1047b43fe5b107a3b0c17c333dceaf978dd5cba6d1e7affcc09b1237c5d734
                            • Instruction ID: c85c5bcdac171d8bde69b0d7b7958b4761fb746438d093521d455192f70fc761
                            • Opcode Fuzzy Hash: ce1047b43fe5b107a3b0c17c333dceaf978dd5cba6d1e7affcc09b1237c5d734
                            • Instruction Fuzzy Hash: 83F0903611CA9219E6646AF86C35A9B27C9BF82E3CF255E1DE660D60D0EF1088424197
                            APIs
                            • OpenSCManagerA.ADVAPI32(00000000,00000000,80000000,00000000,?,?,?,?,?,?,10002C2F,seclogon), ref: 10001992
                            • OpenServiceA.ADVAPI32(00000000,10002C2F,00000004,74DF05F0,00000000,?,?,?,?,?,?,10002C2F,seclogon), ref: 100019A6
                            • QueryServiceStatus.ADVAPI32(00000000,?,?,?,?,?,?,?,10002C2F,seclogon), ref: 100019BD
                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,10002C2F,seclogon), ref: 100019D0
                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,10002C2F,seclogon), ref: 100019D3
                            • GetLastError.KERNEL32(?,?,?,?,?,?,10002C2F,seclogon), ref: 100019D9
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976574315.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                            • Associated: 00000001.00000002.2976553438.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000001.00000002.2976597083.0000000010004000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000001.00000002.2976619836.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_10000000_Au_.jbxd
                            Similarity
                            • API ID: Service$CloseHandleOpen$ErrorLastManagerQueryStatus
                            • String ID:
                            • API String ID: 3744063808-0
                            • Opcode ID: 98206d198cd330a5d98b0aad1fb3198da192d225e5e3ebece727d06186528dce
                            • Instruction ID: 432954036192f9ba08a9e70ce5b752e4165c0fd1d80ed722784ba744950712b6
                            • Opcode Fuzzy Hash: 98206d198cd330a5d98b0aad1fb3198da192d225e5e3ebece727d06186528dce
                            • Instruction Fuzzy Hash: 48F0F43A9083A46BFB1257A18C88BEE7FBCDB483D1F100065EA81A1188CAB4C545CA60
                            APIs
                            • _memmove.LIBCMT ref: 6E5A1802
                            • _memmove.LIBCMT ref: 6E5A189C
                              • Part of subcall function 6E5B96F3: std::exception::exception.LIBCMT ref: 6E5B9706
                              • Part of subcall function 6E5B96F3: __CxxThrowException@8.LIBCMT ref: 6E5B971B
                              • Part of subcall function 6E5B96C5: std::exception::exception.LIBCMT ref: 6E5B96D8
                              • Part of subcall function 6E5B96C5: __CxxThrowException@8.LIBCMT ref: 6E5B96ED
                            • __EH_prolog3.LIBCMT ref: 6E5A18E1
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: Exception@8Throw_memmovestd::exception::exception$H_prolog3
                            • String ID: invalid string position$string too long
                            • API String ID: 1801153282-4289949731
                            • Opcode ID: 933a81896e7a644b6ca43ebc32fbbfffd05a1bebcd3052a52ce0552022ca2d78
                            • Instruction ID: a2ba05a6d44bbd1a9dda9e7fc1bdca556509145060b92ff510836733d280d755
                            • Opcode Fuzzy Hash: 933a81896e7a644b6ca43ebc32fbbfffd05a1bebcd3052a52ce0552022ca2d78
                            • Instruction Fuzzy Hash: 2F51A5B17002029BDB24CEEDDE90AAE77EDEF81754B10496DEA15CB681CB70ED4C8791
                            APIs
                            • __EH_prolog3_GS.LIBCMT ref: 6E5A51E8
                            • Concurrency::details::SchedulerBase::GetPolicy.LIBCMT ref: 6E5A5239
                            • RegOpenKeyExA.ADVAPI32(?,00000000,00000000,00020119,?,00000024,00000001,00000080,6E5A5176,?,?,00000024,6E5B1AB6), ref: 6E5A5254
                            • RegCloseKey.ADVAPI32(?,?,00000024,6E5B1AB6), ref: 6E5A5310
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: Base::CloseConcurrency::details::H_prolog3_OpenPolicyScheduler
                            • String ID: [^a-zA-Z0-9 _-]+
                            • API String ID: 1600596096-3044450163
                            • Opcode ID: 6b8d29b2170f4805e04ea5d26a4ce0128ef5f6fd44c3acb95e6a6d6031de6d5f
                            • Instruction ID: 1b7dcd4d262a13f2f75895025e21795c0e605d93c678ecaf55d4705530f0dce5
                            • Opcode Fuzzy Hash: 6b8d29b2170f4805e04ea5d26a4ce0128ef5f6fd44c3acb95e6a6d6031de6d5f
                            • Instruction Fuzzy Hash: 0F4106718002099FDB04DFE8C990AEDBBF9AF54318F154459D659BB241EB706E49CBA0
                            APIs
                              • Part of subcall function 6E5C9287: __getptd_noexit.LIBCMT ref: 6E5C9288
                              • Part of subcall function 6E5C9287: __amsg_exit.LIBCMT ref: 6E5C9295
                            • _CallSETranslator.LIBCMT ref: 6E5C1B6C
                            • _GetRangeOfTrysToCheck.LIBCMT ref: 6E5C1B96
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: CallCheckRangeTranslatorTrys__amsg_exit__getptd_noexit
                            • String ID: MOC$RCC$_w
                            • API String ID: 2400441249-1066603258
                            • Opcode ID: a3efcec2448019eab0a961c35459b15b4b8c8576fc7e31686c25843bce29d72c
                            • Instruction ID: 14343ab335932db0feffd220c1efe2d9ecba5a948ed55ad6237b8f09b73398ca
                            • Opcode Fuzzy Hash: a3efcec2448019eab0a961c35459b15b4b8c8576fc7e31686c25843bce29d72c
                            • Instruction Fuzzy Hash: C0318B3250010AAFDB11CFC0C9A0FAAB7B9EF88B18F29855CFA1457201D375E955DBA2
                            APIs
                            • __EH_prolog3_GS.LIBCMT ref: 6E5A4C7D
                              • Part of subcall function 6E5A3C23: __EH_prolog3_GS.LIBCMT ref: 6E5A3C2A
                              • Part of subcall function 6E5A3C23: GetCurrentProcess.KERNEL32(00000008,6E5A5049,0000002C,6E5A4CA5,0000005C,6E5A5150), ref: 6E5A3C67
                              • Part of subcall function 6E5A3C23: OpenProcessToken.ADVAPI32(00000000), ref: 6E5A3C6E
                              • Part of subcall function 6E5A3C23: CloseHandle.KERNELBASE(6E5A5049,00000000,0000002C,6E5A4CA5,0000005C,6E5A5150), ref: 6E5A3C96
                              • Part of subcall function 6E5A219D: __EH_prolog3.LIBCMT ref: 6E5A21A4
                              • Part of subcall function 6E5A4B42: __EH_prolog3.LIBCMT ref: 6E5A4B49
                              • Part of subcall function 6E5B6448: GetModuleHandleA.KERNEL32(kernel32,?,?,6E5A4D31,00000000,80000002,6E5E1704,Software,00000000,80000003,00000000,0000005C,6E5A5150,0000002C,6E5A5049,6E5E1704), ref: 6E5B6455
                              • Part of subcall function 6E5B6448: GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 6E5B6466
                              • Part of subcall function 6E5B6448: GetCurrentProcess.KERNEL32(00000000,?,?,?,6E5A4D31,00000000,80000002,6E5E1704,Software,00000000,80000003,00000000,0000005C,6E5A5150,0000002C,6E5A5049), ref: 6E5B6476
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: Process$CurrentH_prolog3H_prolog3_Handle$AddressCloseModuleOpenProcToken
                            • String ID: Software$Software\Wow6432Node$\Software$\Software\Wow6432Node
                            • API String ID: 1678536576-3372360685
                            • Opcode ID: 112020816cdd83de1856564d7329c954319fdf9546481562a732eff83da1e24b
                            • Instruction ID: 262d7d7165951559028b36f70cac8564fa8fda31eead1674c2058e4650e9abc7
                            • Opcode Fuzzy Hash: 112020816cdd83de1856564d7329c954319fdf9546481562a732eff83da1e24b
                            • Instruction Fuzzy Hash: C9410A748012489ADB04DBECCA50AECBBF9AFA8648F548859C716B7241EB745E0DCB61
                            APIs
                            • __EH_prolog3_GS.LIBCMT ref: 6E5A4DD0
                              • Part of subcall function 6E5A3C23: __EH_prolog3_GS.LIBCMT ref: 6E5A3C2A
                              • Part of subcall function 6E5A3C23: GetCurrentProcess.KERNEL32(00000008,6E5A5049,0000002C,6E5A4CA5,0000005C,6E5A5150), ref: 6E5A3C67
                              • Part of subcall function 6E5A3C23: OpenProcessToken.ADVAPI32(00000000), ref: 6E5A3C6E
                              • Part of subcall function 6E5A3C23: CloseHandle.KERNELBASE(6E5A5049,00000000,0000002C,6E5A4CA5,0000005C,6E5A5150), ref: 6E5A3C96
                              • Part of subcall function 6E5A219D: __EH_prolog3.LIBCMT ref: 6E5A21A4
                              • Part of subcall function 6E5A4B42: __EH_prolog3.LIBCMT ref: 6E5A4B49
                              • Part of subcall function 6E5B6448: GetModuleHandleA.KERNEL32(kernel32,?,?,6E5A4D31,00000000,80000002,6E5E1704,Software,00000000,80000003,00000000,0000005C,6E5A5150,0000002C,6E5A5049,6E5E1704), ref: 6E5B6455
                              • Part of subcall function 6E5B6448: GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 6E5B6466
                              • Part of subcall function 6E5B6448: GetCurrentProcess.KERNEL32(00000000,?,?,?,6E5A4D31,00000000,80000002,6E5E1704,Software,00000000,80000003,00000000,0000005C,6E5A5150,0000002C,6E5A5049), ref: 6E5B6476
                            Strings
                            • Software\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 6E5A4E3E
                            • Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 6E5A4EC6
                            • \Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 6E5A4E88
                            • \Software\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 6E5A4DF8
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: Process$CurrentH_prolog3H_prolog3_Handle$AddressCloseModuleOpenProcToken
                            • String ID: Software\Microsoft\Windows\CurrentVersion\Uninstall$Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall$\Software\Microsoft\Windows\CurrentVersion\Uninstall$\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall
                            • API String ID: 1678536576-3281936542
                            • Opcode ID: 4e99ffa8206ce11cc9da582fb4aae0358fd1936f58fdf4af8cb9d3bf99787106
                            • Instruction ID: 734f133e1fd3dda86725960af8a143597fd1b402a1822980ce26427f095637d7
                            • Opcode Fuzzy Hash: 4e99ffa8206ce11cc9da582fb4aae0358fd1936f58fdf4af8cb9d3bf99787106
                            • Instruction Fuzzy Hash: BD410B74801248DEDB04DBECCA50AECBBF9AFA8248F54885DD716B7241EB745E0DCB61
                            APIs
                            • __EH_prolog3_GS.LIBCMT ref: 6E5AE268
                              • Part of subcall function 6E5ADC56: __EH_prolog3.LIBCMT ref: 6E5ADC5D
                              • Part of subcall function 6E5ADC56: CoCreateInstance.OLE32(6E5DA3A8,00000000,00000001,6E5E232C,?,00000008,6E5AE298,All Tasks: ,00000064,6E5B1C15), ref: 6E5ADC7F
                              • Part of subcall function 6E5ADC56: SysFreeString.OLEAUT32(?), ref: 6E5ADCB6
                              • Part of subcall function 6E5ADC56: CoSetProxyBlanket.OLE32(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000,?,ROOT\CIMV2), ref: 6E5ADCCE
                              • Part of subcall function 6E5ADFC1: __EH_prolog3_GS.LIBCMT ref: 6E5ADFC8
                              • Part of subcall function 6E5ADFC1: SysFreeString.OLEAUT32(?), ref: 6E5AE08D
                              • Part of subcall function 6E5ADFC1: SysFreeString.OLEAUT32(?), ref: 6E5AE092
                              • Part of subcall function 6E5ADFC1: VariantInit.OLEAUT32(?), ref: 6E5AE0DC
                              • Part of subcall function 6E5A1792: _memmove.LIBCMT ref: 6E5A189C
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: FreeString$H_prolog3_$BlanketCreateH_prolog3InitInstanceProxyVariant_memmove
                            • String ID: All Tasks: $Name$Win32_ScheduledJob$Win32_ScheduledJob=
                            • API String ID: 1657339313-2270803182
                            • Opcode ID: b0dcf3691dc2c806130d14edeef22b3e847d1b22baa3b6428845ad2a41604726
                            • Instruction ID: 21987873c2b8c278b89ed18849a94b357a0ba5e1937078d0a77f15c94ca6fbb3
                            • Opcode Fuzzy Hash: b0dcf3691dc2c806130d14edeef22b3e847d1b22baa3b6428845ad2a41604726
                            • Instruction Fuzzy Hash: 4A2179B0D012489ACF04EBECCA546DCBBFAAF95208F60859DC755AB281DB705E09CB52
                            APIs
                            • __EH_prolog3.LIBCMT ref: 6E5ADC5D
                            • CoCreateInstance.OLE32(6E5DA3A8,00000000,00000001,6E5E232C,?,00000008,6E5AE298,All Tasks: ,00000064,6E5B1C15), ref: 6E5ADC7F
                              • Part of subcall function 6E5ACCEA: SysFreeString.OLEAUT32 ref: 6E5ACD1B
                            • SysFreeString.OLEAUT32(?), ref: 6E5ADCB6
                            • CoSetProxyBlanket.OLE32(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000,?,ROOT\CIMV2), ref: 6E5ADCCE
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: FreeString$BlanketCreateH_prolog3InstanceProxy
                            • String ID: ROOT\CIMV2
                            • API String ID: 3095441519-2786109267
                            • Opcode ID: d4bb816f92b9a2351a503bc26b5db75252ee90d81703b01755739eca16b5e2ae
                            • Instruction ID: 50c9b77db4f2672610205a50bcadbacbb6d2fbbc45893a1b92925717b41e7d0a
                            • Opcode Fuzzy Hash: d4bb816f92b9a2351a503bc26b5db75252ee90d81703b01755739eca16b5e2ae
                            • Instruction Fuzzy Hash: 7E116D74A40205AFEB149BE4CD54EBF76B9FF86B05B50451CFA52EB290CB718E048B24
                            APIs
                              • Part of subcall function 06D91DD9: lstrcpynA.KERNEL32(06D91054,?,?,?,06D91054,?), ref: 06D91E06
                              • Part of subcall function 06D91DD9: GlobalFree.KERNELBASE ref: 06D91E16
                            • SHBrowseForFolderA.SHELL32(?,?,00000400,?,00000104), ref: 06D910A8
                            • SHGetPathFromIDListA.SHELL32(00000000,?), ref: 06D910C8
                            • CoTaskMemFree.OLE32(00000000,error), ref: 06D910E6
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976302121.0000000006D91000.00000020.00000001.01000000.00000009.sdmp, Offset: 06D90000, based on PE: true
                            • Associated: 00000001.00000002.2976276508.0000000006D90000.00000002.00000001.01000000.00000009.sdmpDownload File
                            • Associated: 00000001.00000002.2976439780.0000000006D93000.00000002.00000001.01000000.00000009.sdmpDownload File
                            • Associated: 00000001.00000002.2976488802.0000000006D94000.00000008.00000001.01000000.00000009.sdmpDownload File
                            • Associated: 00000001.00000002.2976529163.0000000006D97000.00000002.00000001.01000000.00000009.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6d90000_Au_.jbxd
                            Similarity
                            • API ID: Free$BrowseFolderFromGlobalListPathTasklstrcpyn
                            • String ID: E$error
                            • API String ID: 1728609016-2359134700
                            • Opcode ID: 063c3d3ffd18d74498dbf66357ab8249fb8027159ff055d9309e0466914dfe25
                            • Instruction ID: 69c751311d8a7e8536a47f3da0e72c757ff953c2aef81ebc9aca1db617775118
                            • Opcode Fuzzy Hash: 063c3d3ffd18d74498dbf66357ab8249fb8027159ff055d9309e0466914dfe25
                            • Instruction Fuzzy Hash: 3C2138B5D0121AAFCF91DFA2ED44BDE77F8AB08345F004162E609E6200E735D6648FB1
                            APIs
                            • __CxxThrowException@8.LIBCMT ref: 6E5B1418
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: Exception@8Throw
                            • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set$pK^n
                            • API String ID: 2005118841-1228110713
                            • Opcode ID: bd463aae846a97d80c6b3aa8a1630bf5a79fa939354a5cc7bc0e32dd99cf7368
                            • Instruction ID: 13221c6e72ece598da54bb6fca1739fda0bf4051846176473762d6996d377a88
                            • Opcode Fuzzy Hash: bd463aae846a97d80c6b3aa8a1630bf5a79fa939354a5cc7bc0e32dd99cf7368
                            • Instruction Fuzzy Hash: 65019271904309ABDF80CED5C9A1FD977F8AB44308F60C869E914AE942E375E54BCB61
                            APIs
                            Strings
                            • 00000000-0000-0000-0000-000000000000, xrefs: 6E5B6CDB
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: StringUuid$CreateFreeH_prolog3_
                            • String ID: 00000000-0000-0000-0000-000000000000
                            • API String ID: 3372217299-2169625225
                            • Opcode ID: 5f26211200456aa91c6c59c43080803614bfbdb78cef492bdc430c8402599b10
                            • Instruction ID: 60fe691ad0421d724fb46f5c59001563aaea70b521efbdff1f7bd045712f885f
                            • Opcode Fuzzy Hash: 5f26211200456aa91c6c59c43080803614bfbdb78cef492bdc430c8402599b10
                            • Instruction Fuzzy Hash: D8014871D10618BBDF05ABE4D954AEEB3BDAF44208F004829E201E6120EF789A098B55
                            APIs
                            • GetDC.USER32(?), ref: 00401D22
                            • GetDeviceCaps.GDI32(00000000), ref: 00401D29
                            • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D38
                            • CreateFontIndirectA.GDI32(00413B74), ref: 00401D8A
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2972549926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000001.00000002.2972517186.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972577518.0000000000407000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000409000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000413000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000416000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000041F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000046F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972789889.000000000052B000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_400000_Au_.jbxd
                            Similarity
                            • API ID: CapsCreateDeviceFontIndirect
                            • String ID: MS Shell Dlg
                            • API String ID: 3272661963-76309092
                            • Opcode ID: dba0c2efe02f1436e659110f6329974c318dfb36ace0fc9307f647db4be70003
                            • Instruction ID: dbc87e4f6ee83b20b8f61a8a7c3942786851e2433e4431165b402845567ff4dd
                            • Opcode Fuzzy Hash: dba0c2efe02f1436e659110f6329974c318dfb36ace0fc9307f647db4be70003
                            • Instruction Fuzzy Hash: D0F0A470A8C240AFE7016BB0AD0ABD93F649721317F10446AF141BA1E3D57C21009B7E
                            APIs
                            • GetModuleHandleA.KERNEL32(kernel32,?,?,6E5A4D31,00000000,80000002,6E5E1704,Software,00000000,80000003,00000000,0000005C,6E5A5150,0000002C,6E5A5049,6E5E1704), ref: 6E5B6455
                            • GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 6E5B6466
                            • GetCurrentProcess.KERNEL32(00000000,?,?,?,6E5A4D31,00000000,80000002,6E5E1704,Software,00000000,80000003,00000000,0000005C,6E5A5150,0000002C,6E5A5049), ref: 6E5B6476
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: AddressCurrentHandleModuleProcProcess
                            • String ID: IsWow64Process$kernel32
                            • API String ID: 4190356694-3789238822
                            • Opcode ID: 6b85e6f9e2176158f21c3533c0ef07138c1f55fb7b5e864fdd644b00bac8e69a
                            • Instruction ID: 45e932895048724a65b28c9b24d49877a8f4a6cffc800db585f49985f61c8939
                            • Opcode Fuzzy Hash: 6b85e6f9e2176158f21c3533c0ef07138c1f55fb7b5e864fdd644b00bac8e69a
                            • Instruction Fuzzy Hash: D3E0DF36810B19A7CF00ABF08D1CB9F3BFCAB04796F010524E500EB102DE78D600CAA8
                            APIs
                              • Part of subcall function 02501561: lstrcpyA.KERNEL32(00000000,?,?,?,02501804,?,02501017), ref: 0250157E
                              • Part of subcall function 02501561: GlobalFree.KERNEL32 ref: 0250158F
                            • GlobalFree.KERNEL32(?), ref: 02501B41
                            • GlobalFree.KERNEL32(?), ref: 02501CCD
                            • GlobalFree.KERNEL32(?), ref: 02501CD2
                            Memory Dump Source
                            • Source File: 00000001.00000002.2973409424.0000000002501000.00000020.00000001.01000000.00000008.sdmp, Offset: 02500000, based on PE: true
                            • Associated: 00000001.00000002.2973389138.0000000002500000.00000002.00000001.01000000.00000008.sdmpDownload File
                            • Associated: 00000001.00000002.2973429594.0000000002503000.00000002.00000001.01000000.00000008.sdmpDownload File
                            • Associated: 00000001.00000002.2973449141.0000000002505000.00000002.00000001.01000000.00000008.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_2500000_Au_.jbxd
                            Similarity
                            • API ID: FreeGlobal$lstrcpy
                            • String ID:
                            • API String ID: 176019282-0
                            • Opcode ID: 5a34073ec754d5092e67facf689b37ed3c22124f4f3876e9664b10455dcd16c4
                            • Instruction ID: e1bc4959e2f4efa5d3a4f98ea8468900a8a37613ab2dd6ca51851fc5606e22c4
                            • Opcode Fuzzy Hash: 5a34073ec754d5092e67facf689b37ed3c22124f4f3876e9664b10455dcd16c4
                            • Instruction Fuzzy Hash: A951E032D10909EACB269FA88DC467DBBA6BB81348F54C559D80DA71C0D771EE00AB5F
                            APIs
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: _memmove$Exception@8H_prolog3_Throw
                            • String ID:
                            • API String ID: 2435204977-0
                            • Opcode ID: 672457a61c86be245c41eaf3d22b2b57ff2f40d61a7a2877b0b6d3847bd85be3
                            • Instruction ID: 83827fad14b966aa35fb94612a33fdc9c1d6ed50ed2c7e5d55cb076b2e8d4207
                            • Opcode Fuzzy Hash: 672457a61c86be245c41eaf3d22b2b57ff2f40d61a7a2877b0b6d3847bd85be3
                            • Instruction Fuzzy Hash: BA516475A002199FCB04DFE9C8958BDBBF6FF88305B148529EA06EB304DB34AD55CB51
                            APIs
                            • _malloc.LIBCMT ref: 6E5BE207
                              • Part of subcall function 6E5BDFE7: __FF_MSGBANNER.LIBCMT ref: 6E5BDFFE
                              • Part of subcall function 6E5BDFE7: __NMSG_WRITE.LIBCMT ref: 6E5BE005
                              • Part of subcall function 6E5BDFE7: HeapAlloc.KERNEL32(007D0000,00000000,00000001,00000001,6E5B176E,6E5B176E,?,6E5BDD70,00000001,00000000,6E5B176E,?,?,6E5BDC99,6E5B96DD,?), ref: 6E5BE02A
                            • _free.LIBCMT ref: 6E5BE21A
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: AllocHeap_free_malloc
                            • String ID:
                            • API String ID: 2734353464-0
                            • Opcode ID: 7a52e509a5bc18862be3849e47c3f4e774947a9340d33b63a97723b1634edd1e
                            • Instruction ID: 336bea23faeb4b38520e4cd49b06f48bc28811d534ffed9abc81d5b7f53ef740
                            • Opcode Fuzzy Hash: 7a52e509a5bc18862be3849e47c3f4e774947a9340d33b63a97723b1634edd1e
                            • Instruction Fuzzy Hash: 3011CA3290461DAFCF511FF49C34E9A77DCAF46768F1549A9EA0496180DF388C818791
                            APIs
                            • RegOpenKeyExA.ADVAPI32(?,?,00000000,?,?), ref: 00402A57
                            • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402A93
                            • RegCloseKey.ADVAPI32(?), ref: 00402A9C
                            • RegCloseKey.ADVAPI32(?), ref: 00402AC1
                            • RegDeleteKeyA.ADVAPI32(?,?), ref: 00402ADF
                            Memory Dump Source
                            • Source File: 00000001.00000002.2972549926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000001.00000002.2972517186.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972577518.0000000000407000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000409000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000413000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000416000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000041F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000046F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972789889.000000000052B000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_400000_Au_.jbxd
                            Similarity
                            • API ID: Close$DeleteEnumOpen
                            • String ID:
                            • API String ID: 1912718029-0
                            • Opcode ID: 3379485738d87ea4489a121fc5fe0e7c5314169862274de7ec56f73532940607
                            • Instruction ID: 259584080012af4a033af28bf2d78e0e72ca5e45c602eb3588b612967464464b
                            • Opcode Fuzzy Hash: 3379485738d87ea4489a121fc5fe0e7c5314169862274de7ec56f73532940607
                            • Instruction Fuzzy Hash: 4B116A75600009FFDF219F90DE48DAF7B6DEB41344B104436F945A00E0DBB49E55AF6A
                            APIs
                            • __calloc_crt.LIBCMT ref: 6E5BE6B3
                            • CreateThread.KERNEL32(00000000,00000000,6E5BE7E9,00000000,00000000,00000000), ref: 6E5BE6F7
                            • GetLastError.KERNEL32(?,?,6E5B2C1E,00000000,00000000,6E5AD1D1,?,00000000,00000000,?,?,?,?,?,?,?), ref: 6E5BE701
                            • _free.LIBCMT ref: 6E5BE70A
                            • __dosmaperr.LIBCMT ref: 6E5BE715
                              • Part of subcall function 6E5C47D7: __getptd_noexit.LIBCMT ref: 6E5C47D7
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: CreateErrorLastThread__calloc_crt__dosmaperr__getptd_noexit_free
                            • String ID:
                            • API String ID: 2664167353-0
                            • Opcode ID: 9262dfc758f4c3b01fcc7bfebe4108153a7074e313cc058f501e052463a9dc9f
                            • Instruction ID: 1b0921665a8a7e4b83263936f74c69647cae32d969d7b9b1880b4ecb3ae34478
                            • Opcode Fuzzy Hash: 9262dfc758f4c3b01fcc7bfebe4108153a7074e313cc058f501e052463a9dc9f
                            • Instruction Fuzzy Hash: A611A13210474AAFDB119EE99C60DAB3BECEF85B68B14096DFA1486191DF31D8118662
                            APIs
                              • Part of subcall function 6E5C9287: __getptd_noexit.LIBCMT ref: 6E5C9288
                              • Part of subcall function 6E5C9287: __amsg_exit.LIBCMT ref: 6E5C9295
                            • __amsg_exit.LIBCMT ref: 6E5C9A90
                            • __lock.LIBCMT ref: 6E5C9AA0
                            • InterlockedDecrement.KERNEL32(?), ref: 6E5C9ABD
                            • _free.LIBCMT ref: 6E5C9AD0
                            • InterlockedIncrement.KERNEL32(008011F8), ref: 6E5C9AE8
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd_noexit__lock_free
                            • String ID:
                            • API String ID: 1231874560-0
                            • Opcode ID: 0bae88040a0ca3e06100a675646a05917d112c0d97545a4abeb3eef14045d802
                            • Instruction ID: 48b404240b444a8d7b66c1dffaa9fcd4baa810382e27487079430fab34f369a1
                            • Opcode Fuzzy Hash: 0bae88040a0ca3e06100a675646a05917d112c0d97545a4abeb3eef14045d802
                            • Instruction Fuzzy Hash: DD01D232D04A169BDB519FE588247AE77E4BF81F68F06184DD91067680DB346C81CBC7
                            APIs
                            • GetTickCount.KERNEL32 ref: 6E5A3BAA
                            • GetTickCount.KERNEL32 ref: 6E5A3BE7
                            • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000003E8,000005FF), ref: 6E5A3C08
                            • CloseHandle.KERNEL32(?,?,?,?,6E5AD214), ref: 6E5A3C14
                            • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?,?,?,6E5AD214), ref: 6E5A3BBD
                              • Part of subcall function 6E5A3B57: PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 6E5A3B6C
                              • Part of subcall function 6E5A3B57: DispatchMessageA.USER32(?), ref: 6E5A3B7A
                              • Part of subcall function 6E5A3B57: PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 6E5A3B89
                              • Part of subcall function 6E5A3B57: Sleep.KERNEL32(00000000), ref: 6E5A3B94
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: Message$CountPeekTick$CloseCreateDispatchEventHandleMultipleObjectsSleepWait
                            • String ID:
                            • API String ID: 2103223456-0
                            • Opcode ID: a0627ffa4ebd161b8895e01de37b149264167cf2839e087547c197646de9d31f
                            • Instruction ID: bfbb23fde0897fa47f14ec0c0417e4135c6f550d1742cb4ac40685c167ab8572
                            • Opcode Fuzzy Hash: a0627ffa4ebd161b8895e01de37b149264167cf2839e087547c197646de9d31f
                            • Instruction Fuzzy Hash: 91F08C30280A09ABEA405BE9CD9AFAE33ADDF0175DF100430B315A60C2DEA58E4096A4
                            APIs
                            • GetDlgItem.USER32(?), ref: 00401CC5
                            • GetClientRect.USER32(00000000,?), ref: 00401CD2
                            • LoadImageA.USER32(?,00000000,?,?,?,?), ref: 00401CF3
                            • SendMessageA.USER32(00000000,00000172,?,00000000), ref: 00401D01
                            • DeleteObject.GDI32(00000000), ref: 00401D10
                            Memory Dump Source
                            • Source File: 00000001.00000002.2972549926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000001.00000002.2972517186.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972577518.0000000000407000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000409000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000413000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000416000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000041F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000046F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972789889.000000000052B000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_400000_Au_.jbxd
                            Similarity
                            • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                            • String ID:
                            • API String ID: 1849352358-0
                            • Opcode ID: 276fc44ce4f332ec84e3650127dfaa0c07b744a984f4017a3f95436c3d20cf85
                            • Instruction ID: 086d5b446e16212717cf7668c87d994395aec52f986300cbf4c27fae309feacd
                            • Opcode Fuzzy Hash: 276fc44ce4f332ec84e3650127dfaa0c07b744a984f4017a3f95436c3d20cf85
                            • Instruction Fuzzy Hash: 91F01DB2E04105BFD700EBA4EE89DAFB7BDEB44345B104576F602F2190C6789D018B69
                            APIs
                            • __CxxThrowException@8.LIBCMT ref: 6E5A2850
                              • Part of subcall function 6E5C0A65: RaiseException.KERNEL32(?,?,6E5B96F2,6E5B176E,?,?,?,?,6E5B96F2,6E5B176E,6E5E4128,?), ref: 6E5C0AB6
                            • _memmove.LIBCMT ref: 6E5A28A4
                            • _memset.LIBCMT ref: 6E5A28E1
                              • Part of subcall function 6E5A168D: __EH_prolog3.LIBCMT ref: 6E5A1694
                            Strings
                            • HMAC: can only be used with a block-based hash function, xrefs: 6E5A281B
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: ExceptionException@8H_prolog3RaiseThrow_memmove_memset
                            • String ID: HMAC: can only be used with a block-based hash function
                            • API String ID: 3933666237-7675281
                            • Opcode ID: f35e704ccbc9ec064590a6aef39aefd5adfd7d0a6aa806b534009b2cc293c9fa
                            • Instruction ID: 092852a669ee5df48afcb42416b093eff16da4150ba502ad1f538a85852b89ae
                            • Opcode Fuzzy Hash: f35e704ccbc9ec064590a6aef39aefd5adfd7d0a6aa806b534009b2cc293c9fa
                            • Instruction Fuzzy Hash: 215145756043119FCB04CF69C894A5ABBE5FF89314F014AADF9568B352EB30E909CB92
                            APIs
                            Strings
                            • %.2X, xrefs: 6E5B7143
                            • !'()*-.0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ_abcdefghijklmnopqrstuvwxyz~, xrefs: 6E5B70A9
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: H_prolog3_swprintf
                            • String ID: !'()*-.0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ_abcdefghijklmnopqrstuvwxyz~$%.2X
                            • API String ID: 472742393-2473756923
                            • Opcode ID: dc77aa0c9d577017d7f5e4d35f7df7c75c35f63b71ad7a893ec112e64a592b13
                            • Instruction ID: 942f46a764655173dde06c85b84d0e5ac58d55b8f64c69b123e4716314bd7b0a
                            • Opcode Fuzzy Hash: dc77aa0c9d577017d7f5e4d35f7df7c75c35f63b71ad7a893ec112e64a592b13
                            • Instruction Fuzzy Hash: A5219470E002049FDB20DFE8C9A0AEDB6FDAB85214F544A1DE252DB6C1CB709D49CB62
                            APIs
                            • __EH_prolog3.LIBCMT ref: 6E5A4F1B
                              • Part of subcall function 6E5A57E7: __EH_prolog3.LIBCMT ref: 6E5A57EE
                              • Part of subcall function 6E5A57E7: std::locale::_Init.LIBCPMT ref: 6E5A5806
                            Strings
                            • ^Classes$, xrefs: 6E5A4F46
                            • ^\{[0-9a-fA-F]{8}-[0-9a-fA-F]{4}-[0-9a-fA-F]{4}-[0-9a-fA-F]{4}-[0-9a-fA-F]{12}\}$, xrefs: 6E5A4F23
                            • ^Wow6432Node$, xrefs: 6E5A4F35
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: H_prolog3$Initstd::locale::_
                            • String ID: ^Classes$$^Wow6432Node$$^\{[0-9a-fA-F]{8}-[0-9a-fA-F]{4}-[0-9a-fA-F]{4}-[0-9a-fA-F]{4}-[0-9a-fA-F]{12}\}$
                            • API String ID: 463956699-3159395355
                            • Opcode ID: 87d8ad0b2cd0343aa60b69b17495c0f5767f1b855422e88d0958bb38f519d7f0
                            • Instruction ID: 5d71f07aef4e9b3175ef4025726905155c0ac74cf0617239760c66c660a1c419
                            • Opcode Fuzzy Hash: 87d8ad0b2cd0343aa60b69b17495c0f5767f1b855422e88d0958bb38f519d7f0
                            • Instruction Fuzzy Hash: 17212871C242989EDF49CFE8C850AECBBF8BF54204F20062ED215BB251EB301A09CF10
                            APIs
                              • Part of subcall function 6E5A2206: __EH_prolog3_GS.LIBCMT ref: 6E5A220D
                              • Part of subcall function 6E5A168D: __EH_prolog3.LIBCMT ref: 6E5A1694
                            • __CxxThrowException@8.LIBCMT ref: 6E5A1DA7
                              • Part of subcall function 6E5C0A65: RaiseException.KERNEL32(?,?,6E5B96F2,6E5B176E,?,?,?,?,6E5B96F2,6E5B176E,6E5E4128,?), ref: 6E5C0AB6
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: ExceptionException@8H_prolog3H_prolog3_RaiseThrow
                            • String ID: byte digest to $ bytes$HashTransformation: can't truncate a
                            • API String ID: 1139647276-1139078987
                            • Opcode ID: b5ab3e517764dbda5832e7171f02c144bc08331e823d54cadd843d3542f965b4
                            • Instruction ID: b402db13c4257a4cb8f76d6dceff33643f2255a14028d17440f873dfd6e8818a
                            • Opcode Fuzzy Hash: b5ab3e517764dbda5832e7171f02c144bc08331e823d54cadd843d3542f965b4
                            • Instruction Fuzzy Hash: 92318F71508380CFD324CBA8D441BEFBBE9AB88314F10491EE69587380EF749809CBA3
                            APIs
                            • lstrlenA.KERNEL32(00431CA0,00431CA0,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,00404611,000000DF,0000040F,00000400,00000000), ref: 0040477F
                            • wsprintfA.USER32 ref: 00404787
                            • SetDlgItemTextA.USER32(?,00431CA0), ref: 0040479A
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2972549926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000001.00000002.2972517186.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972577518.0000000000407000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000409000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000413000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000416000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000041F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000046F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972789889.000000000052B000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_400000_Au_.jbxd
                            Similarity
                            • API ID: ItemTextlstrlenwsprintf
                            • String ID: %u.%u%s%s
                            • API String ID: 3540041739-3551169577
                            • Opcode ID: 209957d547b213f1450bb2b5f8376dcff8b8e18e64197bb7b829da11d1368e4f
                            • Instruction ID: 36010866de4d4973df748f9dd838e75dfff237001bd6de138a618f82c9ba1ae9
                            • Opcode Fuzzy Hash: 209957d547b213f1450bb2b5f8376dcff8b8e18e64197bb7b829da11d1368e4f
                            • Instruction Fuzzy Hash: 16113473A001243BDB00626D8C45EEF3259CBD6335F14023BFA25F71D1E978AC1282E8
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: _wcscmp
                            • String ID: ACP$OCP
                            • API String ID: 856254489-711371036
                            • Opcode ID: 0a98565c6db8d51054ab253b574a836ef8b7bf409a992444f5a0d55224cff0f3
                            • Instruction ID: 8a70589a223959f15dfaee0d80e1db49e5d392e085fb5f9fdc1f6878c2e21b93
                            • Opcode Fuzzy Hash: 0a98565c6db8d51054ab253b574a836ef8b7bf409a992444f5a0d55224cff0f3
                            • Instruction Fuzzy Hash: 7401802220A506B6EB449BDDCD41FEA33EC9F01765F008815FA18EA181FB70DA8D83DD
                            APIs
                            • __EH_prolog3_GS.LIBCMT ref: 6E5B6D58
                            • UuidToStringA.RPCRT4(?,00000000), ref: 6E5B6D89
                            • RpcStringFreeA.RPCRT4(00000000), ref: 6E5B6DAC
                            Strings
                            • 00000000-0000-0000-0000-000000000000, xrefs: 6E5B6D65
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: String$FreeH_prolog3_Uuid
                            • String ID: 00000000-0000-0000-0000-000000000000
                            • API String ID: 440902543-2169625225
                            • Opcode ID: 3d8a626bd259bf4aac208fa15645e1de04a0acbf9a67a6275e4e63fd5cfb17ee
                            • Instruction ID: e2c46b570aa9b3f8d5712ce99223d58fcf66243d65f4348b4ab2e6bad94d4abb
                            • Opcode Fuzzy Hash: 3d8a626bd259bf4aac208fa15645e1de04a0acbf9a67a6275e4e63fd5cfb17ee
                            • Instruction Fuzzy Hash: B3011A71D10608ABDF04EFD4D994BDEB7F9AF85329F444828E601AA161DF745A098B50
                            APIs
                            • GetClassNameA.USER32(?,?,00000012), ref: 6E5A101B
                            • _memcmp.LIBCMT ref: 6E5A1030
                            • PostMessageA.USER32(?,00000010,00000000,00000000), ref: 6E5A1041
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: ClassMessageNamePost_memcmp
                            • String ID: Chrome_WidgetWin_
                            • API String ID: 780640740-524248775
                            • Opcode ID: 4401c2041db4698ac0ccdea99041685d36118b7c82eefc48bf99c7b6602dcaaf
                            • Instruction ID: 6e917363bfda52bc94188827c587699318f9ea6c2700102caf3daad247ddbab4
                            • Opcode Fuzzy Hash: 4401c2041db4698ac0ccdea99041685d36118b7c82eefc48bf99c7b6602dcaaf
                            • Instruction Fuzzy Hash: E9F0BE71A00209BBEB00EBE48C05EFF37ECAB0A304F410415EA41E6182EB24AA099795
                            APIs
                            • _malloc.LIBCMT ref: 6E5BD5C2
                              • Part of subcall function 6E5BDFE7: __FF_MSGBANNER.LIBCMT ref: 6E5BDFFE
                              • Part of subcall function 6E5BDFE7: __NMSG_WRITE.LIBCMT ref: 6E5BE005
                              • Part of subcall function 6E5BDFE7: HeapAlloc.KERNEL32(007D0000,00000000,00000001,00000001,6E5B176E,6E5B176E,?,6E5BDD70,00000001,00000000,6E5B176E,?,?,6E5BDC99,6E5B96DD,?), ref: 6E5BE02A
                            • std::exception::exception.LIBCMT ref: 6E5BD5DE
                            • __CxxThrowException@8.LIBCMT ref: 6E5BD5F3
                              • Part of subcall function 6E5C0A65: RaiseException.KERNEL32(?,?,6E5B96F2,6E5B176E,?,?,?,?,6E5B96F2,6E5B176E,6E5E4128,?), ref: 6E5C0AB6
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: AllocExceptionException@8HeapRaiseThrow_mallocstd::exception::exception
                            • String ID: pJ^n
                            • API String ID: 1059622496-3108260627
                            • Opcode ID: d60d8febb190ab207f7559fd0dcb514956739c6f63c86a9debd500ff6f4b4d6b
                            • Instruction ID: ca66a89a5bb0f6ce2bb323ce0cbf06fc65b04f94ae82ebead15f6a8885173820
                            • Opcode Fuzzy Hash: d60d8febb190ab207f7559fd0dcb514956739c6f63c86a9debd500ff6f4b4d6b
                            • Instruction Fuzzy Hash: 81E06D7640010EAADF00EFE8CD31AEF76FDAB41248F404815E611E61C0DB70DA45DFA2
                            APIs
                            • GetClassNameA.USER32(?,?,00000200), ref: 6E5A10F8
                            • _memcmp.LIBCMT ref: 6E5A1110
                            • EnumChildWindows.USER32(?,6E5A1059,00000000), ref: 6E5A1123
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: ChildClassEnumNameWindows_memcmp
                            • String ID: IEFrame
                            • API String ID: 4158947655-2708574431
                            • Opcode ID: a557041b19af2c2213d0465e71ee4fc4f18e34d7ca1c6587ef65ea7939125f13
                            • Instruction ID: 7c1efbb2f175d48a88a8a62039e67584fbf7c3f7b1a56d5b1e9e1e851b876911
                            • Opcode Fuzzy Hash: a557041b19af2c2213d0465e71ee4fc4f18e34d7ca1c6587ef65ea7939125f13
                            • Instruction Fuzzy Hash: 76F054B5500619ABDB00EBE58D09AEF73ECAB09204F414465EA11E6181EB34EE498B95
                            APIs
                            • GetPrivateProfileStringA.KERNEL32(MyRunAsStrings,000000FF,00000000,?,00000208,?), ref: 10001269
                            • SendMessageA.USER32(00000000), ref: 100012A9
                              • Part of subcall function 10001164: GetUserNameA.ADVAPI32(00000000,?), ref: 100011A9
                              • Part of subcall function 10001164: wsprintfA.USER32 ref: 100011D8
                              • Part of subcall function 10001164: GetDlgItem.USER32(?,000003E8), ref: 100011FA
                              • Part of subcall function 10001164: SendMessageA.USER32(00000000), ref: 10001203
                              • Part of subcall function 10001164: LoadLibraryA.KERNEL32(SHELL32,00005503,00000000,00000204), ref: 10001217
                              • Part of subcall function 10001164: LoadStringA.USER32(00000000), ref: 1000121E
                              • Part of subcall function 10001164: GetDlgItem.USER32(?,000003EC), ref: 1000123B
                              • Part of subcall function 10001164: SendMessageA.USER32(00000000), ref: 1000123E
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976574315.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                            • Associated: 00000001.00000002.2976553438.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000001.00000002.2976597083.0000000010004000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000001.00000002.2976619836.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_10000000_Au_.jbxd
                            Similarity
                            • API ID: MessageSend$ItemLoadString$LibraryNamePrivateProfileUserwsprintf
                            • String ID: MyRunAsStrings
                            • API String ID: 2667165715-2281671616
                            • Opcode ID: 1b3d7ef5eff27bbdb13ce52d41ce9ef7954c15fb36c19cb94a92a29c27a032cb
                            • Instruction ID: 35d98105128b023dc0814c3eef1f0673ea542b48aa755e1878cd0529f49a1f15
                            • Opcode Fuzzy Hash: 1b3d7ef5eff27bbdb13ce52d41ce9ef7954c15fb36c19cb94a92a29c27a032cb
                            • Instruction Fuzzy Hash: B3F0E23490034AABFF519FA0CD49FCE3A69EF107D5F100210FA60A00E9DA7199B49AA2
                            APIs
                            • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,6E5BE85A,?), ref: 6E5BE7AB
                            • GetProcAddress.KERNEL32(00000000), ref: 6E5BE7B2
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: AddressLibraryLoadProc
                            • String ID: RoInitialize$combase.dll
                            • API String ID: 2574300362-340411864
                            • Opcode ID: 5c8510186a706087741f87fb69e8e5b4a942b056e395f48eafaaf3ccba7b8694
                            • Instruction ID: 5de1725ae4714e94bba17161a6c7df0e4f08e6e4185f6de2339528c217bd3bc7
                            • Opcode Fuzzy Hash: 5c8510186a706087741f87fb69e8e5b4a942b056e395f48eafaaf3ccba7b8694
                            • Instruction Fuzzy Hash: 27E04FB0550B45ABEF40AFB4CC0DB263AF6F706706F464860F102D6186EF7440049F19
                            APIs
                              • Part of subcall function 06D913C6: GetPropA.USER32(?,NSIS: nsControl pointer property), ref: 06D913CF
                            • LoadCursorA.USER32(00000000,00007F89), ref: 06D9149C
                            • SetCursor.USER32(00000000,?,?,?), ref: 06D914A3
                            • CallWindowProcA.USER32(?,?,00000020,?,?), ref: 06D914C0
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976302121.0000000006D91000.00000020.00000001.01000000.00000009.sdmp, Offset: 06D90000, based on PE: true
                            • Associated: 00000001.00000002.2976276508.0000000006D90000.00000002.00000001.01000000.00000009.sdmpDownload File
                            • Associated: 00000001.00000002.2976439780.0000000006D93000.00000002.00000001.01000000.00000009.sdmpDownload File
                            • Associated: 00000001.00000002.2976488802.0000000006D94000.00000008.00000001.01000000.00000009.sdmpDownload File
                            • Associated: 00000001.00000002.2976529163.0000000006D97000.00000002.00000001.01000000.00000009.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6d90000_Au_.jbxd
                            Similarity
                            • API ID: Cursor$CallLoadProcPropWindow
                            • String ID:
                            • API String ID: 1635134901-3916222277
                            • Opcode ID: 9dcad890ee95e58e82cd7520a3a38ec2b4642b37b7aa016bd1c811b8ee8e7f56
                            • Instruction ID: 093eb2818049ce0b999f1b04055d3fe6474a9156d0cc5dd62d11b13ef6660e4b
                            • Opcode Fuzzy Hash: 9dcad890ee95e58e82cd7520a3a38ec2b4642b37b7aa016bd1c811b8ee8e7f56
                            • Instruction Fuzzy Hash: F5E0C93294420ABFDF516FA2DD05AA93B6AAB1C355F41C420FA1998160C771C4609F71
                            APIs
                            • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,6E5BE780), ref: 6E5BE880
                            • GetProcAddress.KERNEL32(00000000), ref: 6E5BE887
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: AddressLibraryLoadProc
                            • String ID: RoUninitialize$combase.dll
                            • API String ID: 2574300362-2819208100
                            • Opcode ID: b29c467a05b99b3f6738a8388dcd710792988b931eba17b59bcdcd42272ec4cc
                            • Instruction ID: ba20a400f391f8dfe56e7fd0be3f94eb7522b0f054633b9b84441abf9a8e782b
                            • Opcode Fuzzy Hash: b29c467a05b99b3f6738a8388dcd710792988b931eba17b59bcdcd42272ec4cc
                            • Instruction Fuzzy Hash: 21E0B6B1500A44ABEF80AFB0CD4DB253AF5E747705F561424F101D5586EF754484EB19
                            APIs
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: _fgetc
                            • String ID:
                            • API String ID: 762172173-0
                            • Opcode ID: d80ee0a25b4ec8a09f68ea787372c73add6b125b67123b62e39798a7cb28b280
                            • Instruction ID: 44722783cbcdf43f885e29a4e8ddbd2fd68c474c689eb56351be2a520ba63be9
                            • Opcode Fuzzy Hash: d80ee0a25b4ec8a09f68ea787372c73add6b125b67123b62e39798a7cb28b280
                            • Instruction Fuzzy Hash: 09515A31608346DFC710CF69C8A096BBBF9EF89318F900A2EF591971A0E771E944CB52
                            APIs
                            • __EH_prolog3_GS.LIBCMT ref: 6E5AF7E6
                              • Part of subcall function 6E5AFA0D: __EH_prolog3.LIBCMT ref: 6E5AFA14
                              • Part of subcall function 6E5AF747: __EH_prolog3_GS.LIBCMT ref: 6E5AF751
                              • Part of subcall function 6E5AF747: GetTempPathA.KERNEL32(00000104,?,0000012C,6E5AF815,?,00000001,?,?,000001D8,6E5B2E0F,?,?,?,?,?), ref: 6E5AF78A
                            • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 6E5AF987
                              • Part of subcall function 6E5B6C54: __EH_prolog3.LIBCMT ref: 6E5B6C5B
                              • Part of subcall function 6E5B0725: __EH_prolog3_catch.LIBCMT ref: 6E5B072C
                            • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 6E5AF9BB
                            • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 6E5AF9E5
                              • Part of subcall function 6E5B0CAD: __EH_prolog3.LIBCMT ref: 6E5B0CB4
                              • Part of subcall function 6E5B098E: __EH_prolog3_catch.LIBCMT ref: 6E5B0995
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: H_prolog3$H_prolog3_H_prolog3_catchIos_base_dtorstd::ios_base::_$FileMovePathTemp
                            • String ID:
                            • API String ID: 2364275748-0
                            • Opcode ID: 2628c78e3871987ec1765940a5168e6a2ccf4d146b4fa190c698de0668586e85
                            • Instruction ID: 9d3960a88313dff81703e1c6976da1f40b060000fb44296b66a0f1d8be58ceaa
                            • Opcode Fuzzy Hash: 2628c78e3871987ec1765940a5168e6a2ccf4d146b4fa190c698de0668586e85
                            • Instruction Fuzzy Hash: E7518131A00219DFDB14CBE8CD54BEDB7F8AF55304F108499D649AB281EB70AE48CF61
                            APIs
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: AdjustPointer_memmove
                            • String ID:
                            • API String ID: 1721217611-0
                            • Opcode ID: 9930ceb48a9cf0f8b496c862dd3575a5909dd08975cc94b58172f08bf85eaa6f
                            • Instruction ID: a631ba0825af9634dba4d5d8dee5beab6beea235d885e4dcf3d47095eec5d49a
                            • Opcode Fuzzy Hash: 9930ceb48a9cf0f8b496c862dd3575a5909dd08975cc94b58172f08bf85eaa6f
                            • Instruction Fuzzy Hash: 6A41A2362042079FEB149FD5DAB2BBA3BF8AF41B64F10041DE950C66A0DB35D888C657
                            APIs
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: _memset$Exception@8Throw_memmove
                            • String ID:
                            • API String ID: 1000995948-0
                            • Opcode ID: 6d263deedafa077e9a5880a351291580daf4e448149809db4654deab14acc4d1
                            • Instruction ID: 88650dba5d532fb25badc31ca16258fcb104e04c4cb1b192a56007056bc69340
                            • Opcode Fuzzy Hash: 6d263deedafa077e9a5880a351291580daf4e448149809db4654deab14acc4d1
                            • Instruction Fuzzy Hash: 64416175A00205AFDB08DFA9C8599BEFBF6FF88310B14855DEA1697380DB34AD51CB80
                            APIs
                            • WideCharToMultiByte.KERNEL32(00000000,00000000,6E5AE2D9,6E5AE2D8,00000000,00000000,00000000,00000000,FD8D3652,753CE610,00000000,?,00000000,00000000,6E5D7490,000000FF), ref: 6E5B93A3
                            • GetLastError.KERNEL32(?,00000000,00000000,6E5D7490,000000FF,?,6E5ADBD3,00000000,00000000,6E5AE1EF,000000FF,?,00000000,00000000,00000020,00000000), ref: 6E5B93AF
                            • WideCharToMultiByte.KERNEL32(00000000,00000000,6E5AE2D9,00000000,00000000,00000000,00000000,00000000), ref: 6E5B93F2
                            • GetLastError.KERNEL32 ref: 6E5B9405
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: ByteCharErrorLastMultiWide
                            • String ID:
                            • API String ID: 203985260-0
                            • Opcode ID: 4d036e155ab515e90892b9d7c4dbaff188151d846b8cea1b5b17fcda6887240a
                            • Instruction ID: ef0f5d766039c402296c511c9653f839a980951573fbc3c993137e89c8bf9988
                            • Opcode Fuzzy Hash: 4d036e155ab515e90892b9d7c4dbaff188151d846b8cea1b5b17fcda6887240a
                            • Instruction Fuzzy Hash: 5E31D775604715ABD7108FA9CC55FABB7E8EB45714F108629FA05DB2C0D775E800CBA4
                            APIs
                            • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 6E5D0089
                            • __isleadbyte_l.LIBCMT ref: 6E5D00B7
                            • MultiByteToWideChar.KERNEL32(?,00000009,00000000,?,00000000,00000000,?,00000000,00000000,?,00000000,00000000,00000000), ref: 6E5D00E5
                            • MultiByteToWideChar.KERNEL32(?,00000009,00000000,00000001,00000000,00000000,?,00000000,00000000,?,00000000,00000000,00000000), ref: 6E5D011B
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                            • String ID:
                            • API String ID: 3058430110-0
                            • Opcode ID: 0486b2ad671ab77c9a412cfd87a0346cab096d1c3d43decc1e435849873656d7
                            • Instruction ID: 9fdc2993c5b5f3638a8efca27f4815af6959eae2a5bf9408e29c136de04828cc
                            • Opcode Fuzzy Hash: 0486b2ad671ab77c9a412cfd87a0346cab096d1c3d43decc1e435849873656d7
                            • Instruction Fuzzy Hash: D1319C3160425ABFEB11CEF9CC44BBA7BEBBF85710F05442AE460871A0E730D895DB98
                            APIs
                            • WideCharToMultiByte.KERNEL32(?,00000000,?,?,?,?,00000000,00000000,00000000,?,00000001,?,6E5A42AF,00000000,00000003), ref: 6E5A4747
                            • GetLastError.KERNEL32(?,00000001,?,6E5A42AF,00000000,00000003), ref: 6E5A4756
                            • WideCharToMultiByte.KERNEL32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,00000001,?,6E5A42AF,00000000,00000003), ref: 6E5A476F
                            • WideCharToMultiByte.KERNEL32(?,00000000,?,?,?,00000000,00000000,00000000,?,00000001,?,6E5A42AF,00000000,00000003), ref: 6E5A4796
                              • Part of subcall function 6E5A3A47: __CxxThrowException@8.LIBCMT ref: 6E5A3A57
                              • Part of subcall function 6E5A3A47: GetLastError.KERNEL32(?,6E5E4AA4,?,?,)`[n,6E5B656C,)`[n,00000000,?,?,?,6E5B64E5,00000000,?,?,6E5B6029), ref: 6E5A3A5D
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: ByteCharMultiWide$ErrorLast$Exception@8Throw
                            • String ID:
                            • API String ID: 1304663488-0
                            • Opcode ID: 679eb00ce6d7b33e04217fd30150e8eea752e1564d45f4f50b9208b62b1f875a
                            • Instruction ID: 45a6e9fafbba7f383ae9995ec1116ec00dc63eb287e4362a6c50a38b3a355d10
                            • Opcode Fuzzy Hash: 679eb00ce6d7b33e04217fd30150e8eea752e1564d45f4f50b9208b62b1f875a
                            • Instruction Fuzzy Hash: A9219377504124BF9B154EA8EC44CBF3BADEBC67603128639FE09CA104DA71CD0687A4
                            APIs
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: _memmove
                            • String ID:
                            • API String ID: 4104443479-0
                            • Opcode ID: a7807d0504fe4eaad2d29262e55c5021fbe30baf9517175537605eb557ad981c
                            • Instruction ID: a6b43ea275e59478acaaa8712577a27e4e08cbeca5f34477de119763f85ebc30
                            • Opcode Fuzzy Hash: a7807d0504fe4eaad2d29262e55c5021fbe30baf9517175537605eb557ad981c
                            • Instruction Fuzzy Hash: D921CE32A004209FCB20CFACCD9195A7FE9EF853147098A68EA54DB299D771FC00CBA0
                            APIs
                            • RegCreateKeyExA.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 00402341
                            • lstrlenA.KERNEL32(0040DB70,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 00402361
                            • RegSetValueExA.ADVAPI32(?,?,?,?,0040DB70,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 0040239A
                            • RegCloseKey.ADVAPI32(?,?,?,0040DB70,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 0040247D
                            Memory Dump Source
                            • Source File: 00000001.00000002.2972549926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000001.00000002.2972517186.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972577518.0000000000407000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000409000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000413000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000416000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000041F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000046F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972789889.000000000052B000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_400000_Au_.jbxd
                            Similarity
                            • API ID: CloseCreateValuelstrlen
                            • String ID:
                            • API String ID: 1356686001-0
                            • Opcode ID: 7a44758f69a940fdd40397d48906392fba1871583e98eeab66b8864cb714fa92
                            • Instruction ID: 296c73fb00ad4de5de759cf5fdeaac1d87e05e13d386f830c03a67a49eb44fa0
                            • Opcode Fuzzy Hash: 7a44758f69a940fdd40397d48906392fba1871583e98eeab66b8864cb714fa92
                            • Instruction Fuzzy Hash: 261160B1E00109BFEB10AFA0DE49EAF767DFB54398F10413AF905B61D0D6B85D019669
                            APIs
                            • lstrlenA.KERNEL32(74DEF380,00000400,?,00000400,?,74DEF380,00000000), ref: 06D91335
                            • CharPrevA.USER32(74DEF380,00000000,?,74DEF380,00000000), ref: 06D9133F
                            • MulDiv.KERNEL32(?,00000000,00000064), ref: 06D91361
                            • MapDialogRect.USER32(74DEF380,74DEF380), ref: 06D91386
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976302121.0000000006D91000.00000020.00000001.01000000.00000009.sdmp, Offset: 06D90000, based on PE: true
                            • Associated: 00000001.00000002.2976276508.0000000006D90000.00000002.00000001.01000000.00000009.sdmpDownload File
                            • Associated: 00000001.00000002.2976439780.0000000006D93000.00000002.00000001.01000000.00000009.sdmpDownload File
                            • Associated: 00000001.00000002.2976488802.0000000006D94000.00000008.00000001.01000000.00000009.sdmpDownload File
                            • Associated: 00000001.00000002.2976529163.0000000006D97000.00000002.00000001.01000000.00000009.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6d90000_Au_.jbxd
                            Similarity
                            • API ID: CharDialogPrevRectlstrlen
                            • String ID:
                            • API String ID: 3411278111-0
                            • Opcode ID: 084647da2e8f1526957321c09eb2181819d7ed4858f12832e30d83aa481ee06f
                            • Instruction ID: 25f55bb7037ea91b0233744d83bd53179eee25692eb7880691c0b3559a070b50
                            • Opcode Fuzzy Hash: 084647da2e8f1526957321c09eb2181819d7ed4858f12832e30d83aa481ee06f
                            • Instruction Fuzzy Hash: 9F115B35E0162AEFDF51AF65DC09BAE7BB9EB017A5F014451ED29A7641C3309A04CBF0
                            APIs
                            • __EH_prolog3_GS.LIBCMT ref: 6E5A8D81
                              • Part of subcall function 6E5BD5AA: _malloc.LIBCMT ref: 6E5BD5C2
                            • std::_Locinfo::~_Locinfo.LIBCPMT ref: 6E5A8E01
                              • Part of subcall function 6E5AC5FE: __EH_prolog3_GS.LIBCMT ref: 6E5AC605
                            • std::_Locinfo::_Locinfo.LIBCPMT ref: 6E5A8DD3
                            • __Getcoll.LIBCPMT ref: 6E5A8DE5
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: H_prolog3_Locinfostd::_$GetcollLocinfo::_Locinfo::~__malloc
                            • String ID:
                            • API String ID: 3081597017-0
                            • Opcode ID: 6e9cb8a23bfea94575ed3c22ab2e082a85eee1cd35d204f9a660201ef23bd7e9
                            • Instruction ID: 8731fc41f67434901ad5bf66eb3ca841930ed1e12bbde4e122da95b638e71b26
                            • Opcode Fuzzy Hash: 6e9cb8a23bfea94575ed3c22ab2e082a85eee1cd35d204f9a660201ef23bd7e9
                            • Instruction Fuzzy Hash: 63116471800316CFCB20DFECC454BDDBBF4AF98718F108828D665AB280D774A984CB92
                            APIs
                            • GetFileVersionInfoSizeA.VERSION(00000000,?,000000EE), ref: 00401ED4
                            • GlobalAlloc.KERNEL32(00000040,00000000,00000000,?,000000EE), ref: 00401EF2
                            • GetFileVersionInfoA.VERSION(?,?,?,00000000), ref: 00401F0B
                            • VerQueryValueA.VERSION(?,00409010,?,?,?,?,?,00000000), ref: 00401F24
                              • Part of subcall function 00405AC4: wsprintfA.USER32 ref: 00405AD1
                            Memory Dump Source
                            • Source File: 00000001.00000002.2972549926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000001.00000002.2972517186.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972577518.0000000000407000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000409000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000413000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000416000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000041F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000046F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972789889.000000000052B000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_400000_Au_.jbxd
                            Similarity
                            • API ID: FileInfoVersion$AllocGlobalQuerySizeValuewsprintf
                            • String ID:
                            • API String ID: 1404258612-0
                            • Opcode ID: 533bbaa52b75f52b026b180ddfe2c12257574f1b88f86b37d6c92ef85265d070
                            • Instruction ID: 469f1bc5c2da8f7bf21418c9fa7c855411c387b6ab03f9ca10b763bcdfe7d214
                            • Opcode Fuzzy Hash: 533bbaa52b75f52b026b180ddfe2c12257574f1b88f86b37d6c92ef85265d070
                            • Instruction Fuzzy Hash: 4F113A71A00108BEDB01EFA5DD819AEBBB9EB49344B20853AF501F61E1D7389A54DB28
                            APIs
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                            • String ID:
                            • API String ID: 3016257755-0
                            • Opcode ID: 3c6a35542a271610c24967ae1addb0a5128256cd46e27c9700edfec13bdc5c5a
                            • Instruction ID: 095b57c6d44150038db6d105f7725ef2250b3ccbc9a9cd9a2eb71720b5029dc2
                            • Opcode Fuzzy Hash: 3c6a35542a271610c24967ae1addb0a5128256cd46e27c9700edfec13bdc5c5a
                            • Instruction Fuzzy Hash: E301303208014ABBCF425EC4DC618EE3FA6BF49754B448859FE2895020D336C9B1AF82
                            APIs
                            • ___BuildCatchObject.LIBCMT ref: 6E5C16C0
                              • Part of subcall function 6E5C1CE2: ___AdjustPointer.LIBCMT ref: 6E5C1D2B
                            • _UnwindNestedFrames.LIBCMT ref: 6E5C16D7
                            • ___FrameUnwindToState.LIBCMT ref: 6E5C16E9
                            • CallCatchBlock.LIBCMT ref: 6E5C170D
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                            • String ID:
                            • API String ID: 2633735394-0
                            • Opcode ID: f5c8888ff96fed7a35812a77e01c4de3dc70c969fa8e649db047ada91988d5f4
                            • Instruction ID: 41a7e8382e39ef2ea365efc80a9164fa3370fe2834f74c38d9d89059fdd52737
                            • Opcode Fuzzy Hash: f5c8888ff96fed7a35812a77e01c4de3dc70c969fa8e649db047ada91988d5f4
                            • Instruction Fuzzy Hash: E4012D32000109BBCF029FD5CD50EEA3BF9FF89B54F158419FA1865520D376E8A5DBA5
                            APIs
                            • MultiByteToWideChar.KERNEL32(00000003,00000000,6E5ADC99,000000FF,00000000,00000000,?,?,00000001,6E5ADC99,?,6E5ACCFC,?,?,6E5ADC99,ROOT\CIMV2), ref: 6E5ACC98
                            • SysAllocStringLen.OLEAUT32(00000000,-00000001), ref: 6E5ACCA6
                            • MultiByteToWideChar.KERNEL32(00000003,00000000,6E5ADC99,000000FF,00000000,?,?,?,00000001,6E5ADC99,?,6E5ACCFC,?,?,6E5ADC99,ROOT\CIMV2), ref: 6E5ACCBC
                            • SysFreeString.OLEAUT32(00000000), ref: 6E5ACCC8
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: ByteCharMultiStringWide$AllocFree
                            • String ID:
                            • API String ID: 447844807-0
                            • Opcode ID: 35a62f96e8eed8c10d117f99080987ecbbdc96e6392bc22793de3d9932438b4c
                            • Instruction ID: b419b5e4530495dafc005bfd92e2aa55cca16a1b6ed14c41ae5f342118b576b8
                            • Opcode Fuzzy Hash: 35a62f96e8eed8c10d117f99080987ecbbdc96e6392bc22793de3d9932438b4c
                            • Instruction Fuzzy Hash: CDF0C231244526BF9B1246DE8C6DD6FBEACDB87671B110218F334D6180DB609D0082B0
                            APIs
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: CompareString____lc_collate_cp_func____lc_locale_name_func___crt_memcmp
                            • String ID:
                            • API String ID: 1685134921-0
                            • Opcode ID: 65bf027ae206f65f0fd2a2b36974c332b74ad8415c6e714963dd838e85d27d56
                            • Instruction ID: 6f6ae3cfa52e161693574e018bfc7ea053f070a4733dc556cbea42c3fbd485ea
                            • Opcode Fuzzy Hash: 65bf027ae206f65f0fd2a2b36974c332b74ad8415c6e714963dd838e85d27d56
                            • Instruction Fuzzy Hash: D2F02832600515AAD7205ADD8CE0EEB37ECDFA1B64F14CA10FE38CA194E7328C924352
                            APIs
                            • CallWindowProcA.USER32(?,?,?,?), ref: 06D9143B
                            • DestroyWindow.USER32 ref: 06D91452
                            • GetProcessHeap.KERNEL32(00000000), ref: 06D9145F
                            • HeapFree.KERNEL32(00000000), ref: 06D91466
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976302121.0000000006D91000.00000020.00000001.01000000.00000009.sdmp, Offset: 06D90000, based on PE: true
                            • Associated: 00000001.00000002.2976276508.0000000006D90000.00000002.00000001.01000000.00000009.sdmpDownload File
                            • Associated: 00000001.00000002.2976439780.0000000006D93000.00000002.00000001.01000000.00000009.sdmpDownload File
                            • Associated: 00000001.00000002.2976488802.0000000006D94000.00000008.00000001.01000000.00000009.sdmpDownload File
                            • Associated: 00000001.00000002.2976529163.0000000006D97000.00000002.00000001.01000000.00000009.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6d90000_Au_.jbxd
                            Similarity
                            • API ID: HeapWindow$CallDestroyFreeProcProcess
                            • String ID:
                            • API String ID: 1278960361-0
                            • Opcode ID: 008ede724a25f9bf91a08ab9fd3d48a154c393e0a4de23f191b80e659377b87c
                            • Instruction ID: 0c9f8021ad93a01721af6d469fa5cf51a5629f839e3977ada9d3ce5bc609f885
                            • Opcode Fuzzy Hash: 008ede724a25f9bf91a08ab9fd3d48a154c393e0a4de23f191b80e659377b87c
                            • Instruction Fuzzy Hash: BD010C32510206EBCF529F96FC049A93BAAFB49266B508625FB5D82250C7318464DFB1
                            APIs
                            • __EH_prolog3.LIBCMT ref: 6E5B5DA9
                              • Part of subcall function 6E5BD5AA: _malloc.LIBCMT ref: 6E5BD5C2
                            • std::_Locinfo::_Locinfo.LIBCPMT ref: 6E5B5DDE
                              • Part of subcall function 6E5AC947: __EH_prolog3.LIBCMT ref: 6E5AC94E
                              • Part of subcall function 6E5AC947: std::_Lockit::_Lockit.LIBCPMT ref: 6E5AC95B
                              • Part of subcall function 6E5AC947: std::exception::exception.LIBCMT ref: 6E5AC9A2
                              • Part of subcall function 6E5AC947: __CxxThrowException@8.LIBCMT ref: 6E5AC9B7
                              • Part of subcall function 6E5AC947: std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 6E5AC9C0
                            • numpunct.LIBCPMT ref: 6E5B5DFC
                              • Part of subcall function 6E5B5CE0: __EH_prolog3_catch.LIBCMT ref: 6E5B5CE7
                              • Part of subcall function 6E5B5CE0: _localeconv.LIBCMT ref: 6E5B5CF1
                              • Part of subcall function 6E5B5CE0: __Getcvt.LIBCPMT ref: 6E5B5CFC
                              • Part of subcall function 6E5B5CE0: __Getcvt.LIBCPMT ref: 6E5B5D29
                            • std::_Locinfo::~_Locinfo.LIBCPMT ref: 6E5B5E0F
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: std::_$GetcvtH_prolog3LocinfoLocinfo::_$Exception@8H_prolog3_catchLocinfo::~_Locinfo_ctorLockitLockit::_Throw_localeconv_mallocnumpunctstd::exception::exception
                            • String ID:
                            • API String ID: 2227016329-0
                            • Opcode ID: 723a7b718b2f54165389a0c4a06814d2c7375fe4aa7c264d8337ec425f7aebe7
                            • Instruction ID: 0226e7f7759576e1d4d07b223865d9089e29ae2723377cf00fb93a0cca6497c4
                            • Opcode Fuzzy Hash: 723a7b718b2f54165389a0c4a06814d2c7375fe4aa7c264d8337ec425f7aebe7
                            • Instruction Fuzzy Hash: 0C017C7190021A9FCB54DFD8C5A17ADB3F9BF84B14F60896ED654AB280CBB05E04C7A1
                            APIs
                            • __EH_prolog3.LIBCMT ref: 6E5ADBE6
                            • VariantInit.OLEAUT32(?), ref: 6E5ADC09
                            • VariantChangeType.OLEAUT32(?,?,00000000,00000008), ref: 6E5ADC28
                            • VariantClear.OLEAUT32(?), ref: 6E5ADC46
                              • Part of subcall function 6E5ADB50: __EH_prolog3.LIBCMT ref: 6E5ADB57
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: Variant$H_prolog3$ChangeClearInitType
                            • String ID:
                            • API String ID: 4262505642-0
                            • Opcode ID: bc7906331779ad689a655021138756579fd4b19b323304bfe3d4871dc47be4de
                            • Instruction ID: d8d0f7a2f4c7c223c6d7707872bac7055bb260f9b37176a072dafbd68a6b7286
                            • Opcode Fuzzy Hash: bc7906331779ad689a655021138756579fd4b19b323304bfe3d4871dc47be4de
                            • Instruction Fuzzy Hash: A4014F759101099BDB01EBE4C954BDDB2FCAF44709F604855EB01E7040DB75AE44CB69
                            APIs
                            • __lock.LIBCMT ref: 6E5C9352
                              • Part of subcall function 6E5C2158: __mtinitlocknum.LIBCMT ref: 6E5C216A
                              • Part of subcall function 6E5C2158: __amsg_exit.LIBCMT ref: 6E5C2176
                              • Part of subcall function 6E5C2158: EnterCriticalSection.KERNEL32(00000000,?,6E5C9357,0000000D), ref: 6E5C2183
                            • InterlockedIncrement.KERNEL32(?), ref: 6E5C935F
                            • __lock.LIBCMT ref: 6E5C9373
                            • ___addlocaleref.LIBCMT ref: 6E5C9391
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: __lock$CriticalEnterIncrementInterlockedSection___addlocaleref__amsg_exit__mtinitlocknum
                            • String ID:
                            • API String ID: 153627126-0
                            • Opcode ID: 470ab2a15455edad2601c51901403c576bb9d7d48515022aa1e0a7681b8f163e
                            • Instruction ID: 6e04159130d5128f87449c604907638b557d321e3df6b7eab115fb40adce156f
                            • Opcode Fuzzy Hash: 470ab2a15455edad2601c51901403c576bb9d7d48515022aa1e0a7681b8f163e
                            • Instruction Fuzzy Hash: 4B016171400B04DFD7208FE9C41578AB7E4AF84B19F20894ED699977A0CB70A941CB16
                            APIs
                            • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 6E5A3B6C
                            • DispatchMessageA.USER32(?), ref: 6E5A3B7A
                            • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 6E5A3B89
                            • Sleep.KERNEL32(00000000), ref: 6E5A3B94
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: Message$Peek$DispatchSleep
                            • String ID:
                            • API String ID: 3374569338-0
                            • Opcode ID: 77e7a3aee6726ba6edfb4bb8210cfd355a804bff9b05a3f54b0c4ed382877891
                            • Instruction ID: 591e6d69f2f79f9758c0797f380135575faa2fb27d37086bd63e2e37fbacfc4a
                            • Opcode Fuzzy Hash: 77e7a3aee6726ba6edfb4bb8210cfd355a804bff9b05a3f54b0c4ed382877891
                            • Instruction Fuzzy Hash: 9FF037B2E4060D7FEB106EF94CCCEEF76ADD70568CB014421B652D1046EA65DC014774
                            APIs
                            • GetDlgItem.USER32(?,000003EC), ref: 1000145F
                            • SendMessageA.USER32(00000000), ref: 10001462
                            • GetDlgItem.USER32(?,00000001), ref: 10001477
                            • EnableWindow.USER32(00000000), ref: 1000147A
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976574315.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                            • Associated: 00000001.00000002.2976553438.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000001.00000002.2976597083.0000000010004000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000001.00000002.2976619836.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_10000000_Au_.jbxd
                            Similarity
                            • API ID: Item$EnableMessageSendWindow
                            • String ID:
                            • API String ID: 3471810782-0
                            • Opcode ID: 15d315f0db403b3f3c16512ae4a295740f4d5e2608bcb69e19ad7cb2dcc1ea7e
                            • Instruction ID: 77863b45c66a0b8e4b700892c5372225986847c0b6868ea12d8a7278d44f8156
                            • Opcode Fuzzy Hash: 15d315f0db403b3f3c16512ae4a295740f4d5e2608bcb69e19ad7cb2dcc1ea7e
                            • Instruction Fuzzy Hash: 3FE06D70A04220ABFB109B608C84EFB7E9EEB41790F004816F584E60E5C661CC81DA61
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID: 0-3916222277
                            • Opcode ID: edaa4012f872d3f4d53c587681ce35f0faf850dc3408d0996882797d1f3b6d65
                            • Instruction ID: 50958b4611b409ce0b4645b0c5ca992285b1d381e50726416964319669a99b65
                            • Opcode Fuzzy Hash: edaa4012f872d3f4d53c587681ce35f0faf850dc3408d0996882797d1f3b6d65
                            • Instruction Fuzzy Hash: 2A514B712183069FC715CF68C490A5EB7F9BF88318F604E2EFA9597240E730E949CB62
                            APIs
                              • Part of subcall function 6E5A49A7: lstrcpynA.KERNEL32(?,6E5E1708,?,00002000,6E5E1704,6E5B18D9), ref: 6E5A49CD
                              • Part of subcall function 6E5A49A7: GlobalFree.KERNEL32(6E5E1704), ref: 6E5A49DE
                              • Part of subcall function 6E5B6E7E: __EH_prolog3_GS.LIBCMT ref: 6E5B6E85
                            • UuidFromStringA.RPCRT4(?,?), ref: 6E5B21C1
                            • _free.LIBCMT ref: 6E5B22CA
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: FreeFromGlobalH_prolog3_StringUuid_freelstrcpyn
                            • String ID: d%^n
                            • API String ID: 4020302587-632555462
                            • Opcode ID: 34d360abf1470c0b8500bda13a982ec4b34dfcf53586415e5b4f7db460643fe8
                            • Instruction ID: a0b12ce2c7fa0a813fc11eed02f204a1a673f983f664d804a7a88b9521f7d4e6
                            • Opcode Fuzzy Hash: 34d360abf1470c0b8500bda13a982ec4b34dfcf53586415e5b4f7db460643fe8
                            • Instruction Fuzzy Hash: D3514571118784AFD760DBA8C854ADFB7F9AFD9304F400C2DE68987260EB30A949CB53
                            APIs
                            • Concurrency::details::_Concurrent_queue_base_v4::_Internal_throw_exception.LIBCPMT ref: 6E5B681E
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: Concurrency::details::_Concurrent_queue_base_v4::_Internal_throw_exception
                            • String ID: Ob[n$vector<T> too long
                            • API String ID: 120817956-4091465483
                            • Opcode ID: 7b4fa60e1a0667b1c142ec668ec5e4af389142041af26fd45584831816cf7dc9
                            • Instruction ID: 49181bda5f627d3dd1386739d7374cf68483ebd5c16675bf5f8ff47726755fbc
                            • Opcode Fuzzy Hash: 7b4fa60e1a0667b1c142ec668ec5e4af389142041af26fd45584831816cf7dc9
                            • Instruction Fuzzy Hash: C141307572020A9FDF08CFACC9A489AB7E5FF883147148669E919DB345D770EE11CB50
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: _memmove
                            • String ID: invalid string position$string too long
                            • API String ID: 4104443479-4289949731
                            • Opcode ID: f6b2580a8274c1c6783b641aa4001b0075c53ae62bed2ea7d74ce34194859604
                            • Instruction ID: a8d734556e42e6a7f12d512fc380f35cbfae5c203d6ad0aaac21656d4428cd9c
                            • Opcode Fuzzy Hash: f6b2580a8274c1c6783b641aa4001b0075c53ae62bed2ea7d74ce34194859604
                            • Instruction Fuzzy Hash: D921C3712002019BDB24EEEDD840E6E77EEAB8A744B10492DF6118F641D771D9418BD1
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: H_prolog3_Stoulx
                            • String ID: -
                            • API String ID: 3180878350-2547889144
                            • Opcode ID: 026378603fe90d89ee7c43752f34ea09e21d7d1e26604f7b8e69acfb59b73d22
                            • Instruction ID: 032337c8143cfd9768763aef574e5225173900bc0632e6065aff327f47cb39f9
                            • Opcode Fuzzy Hash: 026378603fe90d89ee7c43752f34ea09e21d7d1e26604f7b8e69acfb59b73d22
                            • Instruction Fuzzy Hash: 982139B2900219AFDB15DFD4D9A0AEEB7F8AF48314F00466AF905A7280E734AE05CB51
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: H_prolog3_Stoulx
                            • String ID: -
                            • API String ID: 3180878350-2547889144
                            • Opcode ID: 15adee37f37a5fec4fe48ac3a99703d264b6c4190a5bb12fcc535780cd5752fc
                            • Instruction ID: 80fab633163e3036ff80eb4ec87e7f5906cbc37a9845b0b192edbfb5988aced8
                            • Opcode Fuzzy Hash: 15adee37f37a5fec4fe48ac3a99703d264b6c4190a5bb12fcc535780cd5752fc
                            • Instruction Fuzzy Hash: FE212DB290021CAFDF11DF94D990AEEB7F8FB48314F11466AE915A7280D7309E09CB91
                            APIs
                            • IsWindowVisible.USER32(?), ref: 00404E8A
                            • CallWindowProcA.USER32(?,00000200,?,?), ref: 00404EF8
                              • Part of subcall function 00403F64: SendMessageA.USER32(?,00000000,00000000,00000000), ref: 00403F76
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2972549926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000001.00000002.2972517186.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972577518.0000000000407000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000409000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000413000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000416000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000041F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000046F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972789889.000000000052B000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_400000_Au_.jbxd
                            Similarity
                            • API ID: Window$CallMessageProcSendVisible
                            • String ID:
                            • API String ID: 3748168415-3916222277
                            • Opcode ID: a84b5296b4eeae82f408269d2d1b8d7033f61a03f51c3bbd89419221396ae481
                            • Instruction ID: 574ffcac201dacb39b42018bad0bebdbc1389d908601d56a0bf61ad4508792f4
                            • Opcode Fuzzy Hash: a84b5296b4eeae82f408269d2d1b8d7033f61a03f51c3bbd89419221396ae481
                            • Instruction Fuzzy Hash: D6114F71940208BBEF21AF52DC4499F3729FB45769F00803BF604792E1C77D5A519BAD
                            APIs
                            • EnumWindows.USER32(6E5A11CE,00000000), ref: 6E5B175A
                              • Part of subcall function 6E5B60C3: __EH_prolog3.LIBCMT ref: 6E5B60CA
                              • Part of subcall function 6E5B60C3: Sleep.KERNEL32(00000032,00000024,6E5B177C,firefox.exe), ref: 6E5B6100
                            • EnumWindows.USER32(6E5A113B,00000000), ref: 6E5B1796
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: EnumWindows$H_prolog3Sleep
                            • String ID: firefox.exe
                            • API String ID: 2049615448-3034799888
                            • Opcode ID: e54cbb1c8ced4945fdf1e05504b4761167e49f5d5de36826325e37d1a0530175
                            • Instruction ID: f705b3dab53ce7134d72811387f7ff3896224fd356826d4aa06da101c25766f0
                            • Opcode Fuzzy Hash: e54cbb1c8ced4945fdf1e05504b4761167e49f5d5de36826325e37d1a0530175
                            • Instruction Fuzzy Hash: C6018C71A04745AFCB40EFA8C995A9E7BE4FB49654F014919FA598B381EF30E808CB81
                            APIs
                            • __EH_prolog3_GS.LIBCMT ref: 6E5B1644
                              • Part of subcall function 6E5A168D: __EH_prolog3.LIBCMT ref: 6E5A1694
                            • __CxxThrowException@8.LIBCMT ref: 6E5B168C
                              • Part of subcall function 6E5C0A65: RaiseException.KERNEL32(?,?,6E5B96F2,6E5B176E,?,?,?,?,6E5B96F2,6E5B176E,6E5E4128,?), ref: 6E5C0AB6
                            Strings
                            • : this object doesn't support resynchronization, xrefs: 6E5B165D
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: ExceptionException@8H_prolog3H_prolog3_RaiseThrow
                            • String ID: : this object doesn't support resynchronization
                            • API String ID: 1139647276-2714550406
                            • Opcode ID: ceec2945c2fa468eb6c5fcaa8e48cc4aad81074cdc02006c9161c710d36e731b
                            • Instruction ID: 4c773153f9c77b1da92882db77ff3a60e64ce0b2ac278603d94cb6b636d040cb
                            • Opcode Fuzzy Hash: ceec2945c2fa468eb6c5fcaa8e48cc4aad81074cdc02006c9161c710d36e731b
                            • Instruction Fuzzy Hash: 1EF06771610208AFDB00DBE8D945FEEBBF8AF44304F104459A205EFA81DB70AE48CB66
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: _memcmp
                            • String ID: HKEY_CLASSES_ROOT$WSZn
                            • API String ID: 2931989736-4166011388
                            • Opcode ID: 56697756f125c7f4f0cc85555ddf2027b3cd69df537d13dd7dbd4c5657d8003e
                            • Instruction ID: e6c31095425ab6802665cd054458a17c3297700cbf2977160ebed50c4958f203
                            • Opcode Fuzzy Hash: 56697756f125c7f4f0cc85555ddf2027b3cd69df537d13dd7dbd4c5657d8003e
                            • Instruction Fuzzy Hash: 10F0E23260022ADFDF08DE6D9C014EE33EAAF44610711492CEC21A7191D332ED528AE2
                            APIs
                            • __EH_prolog3_GS.LIBCMT ref: 6E5A1DD8
                              • Part of subcall function 6E5A168D: __EH_prolog3.LIBCMT ref: 6E5A1694
                            • __CxxThrowException@8.LIBCMT ref: 6E5A1E19
                              • Part of subcall function 6E5C0A65: RaiseException.KERNEL32(?,?,6E5B96F2,6E5B176E,?,?,?,?,6E5B96F2,6E5B176E,6E5E4128,?), ref: 6E5C0AB6
                              • Part of subcall function 6E5A39D1: _malloc.LIBCMT ref: 6E5A39DC
                            Strings
                            • AllocatorBase: requested size would cause integer overflow, xrefs: 6E5A1DEA
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: ExceptionException@8H_prolog3H_prolog3_RaiseThrow_malloc
                            • String ID: AllocatorBase: requested size would cause integer overflow
                            • API String ID: 2421882169-10355266
                            • Opcode ID: b4da84afee581c181de87b0246a7be4c69c1ad276af28116d43bb85d69f5bfaf
                            • Instruction ID: 1eb29d95b85dec34d93d15babb4f46146cdca4b8f75dd370aa84f135ace8933a
                            • Opcode Fuzzy Hash: b4da84afee581c181de87b0246a7be4c69c1ad276af28116d43bb85d69f5bfaf
                            • Instruction Fuzzy Hash: 4CF090B1A001049ECB54DBE8CA20BED77F89F58714F50891DE712EB680DB348E0C8766
                            APIs
                            • __EH_prolog3_GS.LIBCMT ref: 6E5A1A20
                              • Part of subcall function 6E5A168D: __EH_prolog3.LIBCMT ref: 6E5A1694
                            • __CxxThrowException@8.LIBCMT ref: 6E5A1A54
                              • Part of subcall function 6E5C0A65: RaiseException.KERNEL32(?,?,6E5B96F2,6E5B176E,?,?,?,?,6E5B96F2,6E5B176E,6E5E4128,?), ref: 6E5C0AB6
                              • Part of subcall function 6E5A172C: __EH_prolog3.LIBCMT ref: 6E5A1733
                              • Part of subcall function 6E5A172C: std::exception::exception.LIBCMT ref: 6E5A1741
                            Strings
                            • Clone() is not implemented yet., xrefs: 6E5A1A25
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: H_prolog3$ExceptionException@8H_prolog3_RaiseThrowstd::exception::exception
                            • String ID: Clone() is not implemented yet.
                            • API String ID: 3352605447-226299721
                            • Opcode ID: 5116eb8b39d25dc23c434671df0526320536e00aecde1dff2047efcf66f6181a
                            • Instruction ID: ccef2e9ffd92b1ec9070d149927d81980cbcd496800ff838f0bbfe7bb793c319
                            • Opcode Fuzzy Hash: 5116eb8b39d25dc23c434671df0526320536e00aecde1dff2047efcf66f6181a
                            • Instruction Fuzzy Hash: FDF01CB1910118AACB10DBD9CD00BDDBBFCAB587A4F440429E704EB941DBB19D09CB6A
                            APIs
                            • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,0043E4A8,Error launching installer), ref: 004053EB
                            • CloseHandle.KERNEL32(?), ref: 004053F8
                            Strings
                            • Error launching installer, xrefs: 004053D9
                            Memory Dump Source
                            • Source File: 00000001.00000002.2972549926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000001.00000002.2972517186.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972577518.0000000000407000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000409000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000413000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000416000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000041F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000046F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972789889.000000000052B000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_400000_Au_.jbxd
                            Similarity
                            • API ID: CloseCreateHandleProcess
                            • String ID: Error launching installer
                            • API String ID: 3712363035-66219284
                            • Opcode ID: b7c9d10a8054e1d63aace513746620387ba85298539cfb76979fbda5e6a590d7
                            • Instruction ID: 5c094ea24e64812d6ab6634a7517117686aedeac2daf9b822694a8d73c7fdf3e
                            • Opcode Fuzzy Hash: b7c9d10a8054e1d63aace513746620387ba85298539cfb76979fbda5e6a590d7
                            • Instruction Fuzzy Hash: 43E0ECB4900209AFEB00AF65DC49AAB7BBDEB18315F10D522A911E2190D775D8109A79
                            APIs
                              • Part of subcall function 6E5BD5AA: _malloc.LIBCMT ref: 6E5BD5C2
                            • Concurrency::details::_Concurrent_queue_base_v4::_Internal_throw_exception.LIBCPMT ref: 6E5B6616
                            Strings
                            Memory Dump Source
                            • Source File: 00000001.00000002.2976668284.000000006E5A1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E5A0000, based on PE: true
                            • Associated: 00000001.00000002.2976646555.000000006E5A0000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976713572.000000006E5DA000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976738171.000000006E5E8000.00000004.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000001.00000002.2976758912.000000006E5ED000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6e5a0000_Au_.jbxd
                            Similarity
                            • API ID: Concurrency::details::_Concurrent_queue_base_v4::_Internal_throw_exception_malloc
                            • String ID: Ob[n$list<T> too long
                            • API String ID: 657562460-1467821306
                            • Opcode ID: ab8f10ec5115c6317694ca7565a4e494030976c81e9f900ec708935f841ea63b
                            • Instruction ID: d19f269edfea53820305203cbc2b8aa3f93fcfdc0b7833d5b1c63df915a46665
                            • Opcode Fuzzy Hash: ab8f10ec5115c6317694ca7565a4e494030976c81e9f900ec708935f841ea63b
                            • Instruction Fuzzy Hash: 5CE04FB53143069B9B4C9F95C070A7637DCABA1214B10882DD9198F684DA71D8008720
                            APIs
                            • FreeLibrary.KERNEL32(?,"C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exe" ,00000000,74DF2EE0,004035F1,00000000,0040342D,00000000), ref: 00403634
                            • GlobalFree.KERNEL32(?), ref: 0040363B
                            Strings
                            • "C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exe" , xrefs: 0040362C
                            Memory Dump Source
                            • Source File: 00000001.00000002.2972549926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000001.00000002.2972517186.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972577518.0000000000407000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000409000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000413000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000416000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000041F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000046F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972789889.000000000052B000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_400000_Au_.jbxd
                            Similarity
                            • API ID: Free$GlobalLibrary
                            • String ID: "C:\Users\user\AppData\Local\Temp\~nsu.tmp\Au_.exe"
                            • API String ID: 1100898210-1499594739
                            • Opcode ID: 75c0d4a1740ce41e79f0191f5d68a1ca9e627b85db2cb00bb4df0cbf6dd70357
                            • Instruction ID: cf5896ae3eaafbbd98579327fd8fb68bce34fe610569fc10f3715d7aba606bee
                            • Opcode Fuzzy Hash: 75c0d4a1740ce41e79f0191f5d68a1ca9e627b85db2cb00bb4df0cbf6dd70357
                            • Instruction Fuzzy Hash: 1AE0C233D04020ABCB325F46EC0575A77ACAF48B72F024426E8007B3A087742C424FDC
                            APIs
                              • Part of subcall function 02501561: lstrcpyA.KERNEL32(00000000,?,?,?,02501804,?,02501017), ref: 0250157E
                              • Part of subcall function 02501561: GlobalFree.KERNEL32 ref: 0250158F
                            • GlobalAlloc.KERNEL32(00000040,?), ref: 02501151
                            • GlobalFree.KERNEL32(00000000), ref: 025011AA
                            • GlobalFree.KERNEL32(?), ref: 025011BD
                            • GlobalFree.KERNEL32(?), ref: 025011EB
                            Memory Dump Source
                            • Source File: 00000001.00000002.2973409424.0000000002501000.00000020.00000001.01000000.00000008.sdmp, Offset: 02500000, based on PE: true
                            • Associated: 00000001.00000002.2973389138.0000000002500000.00000002.00000001.01000000.00000008.sdmpDownload File
                            • Associated: 00000001.00000002.2973429594.0000000002503000.00000002.00000001.01000000.00000008.sdmpDownload File
                            • Associated: 00000001.00000002.2973449141.0000000002505000.00000002.00000001.01000000.00000008.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_2500000_Au_.jbxd
                            Similarity
                            • API ID: Global$Free$Alloclstrcpy
                            • String ID:
                            • API String ID: 852173138-0
                            • Opcode ID: 897ac0c4bb73b06b393ef8a5bc0bf7cdd6f1ae598817b006346b8eefe8320f4a
                            • Instruction ID: 8681ff1b866bdcbcd7e8f104720721c39c3ac61883fa7111f3701dd1427f2f32
                            • Opcode Fuzzy Hash: 897ac0c4bb73b06b393ef8a5bc0bf7cdd6f1ae598817b006346b8eefe8320f4a
                            • Instruction Fuzzy Hash: 1F31E071840A45AFE714DF68EDD8E3A7FB8FB45354B048855E949DA184E7308814CF1E
                            APIs
                            • lstrlenA.KERNEL32(00000000,?,00000000,00000000,004059C0,00000000,[Rename],?,?,00000000,000000F1,?), ref: 004057B9
                            • lstrcmpiA.KERNEL32(00000000,00000000), ref: 004057D2
                            • CharNextA.USER32(00000000,?,?,00000000,000000F1,?), ref: 004057E0
                            • lstrlenA.KERNEL32(00000000,00000000,?,00000000,00000000,004059C0,00000000,[Rename],?,?,00000000,000000F1,?), ref: 004057E9
                            Memory Dump Source
                            • Source File: 00000001.00000002.2972549926.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000001.00000002.2972517186.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972577518.0000000000407000.00000002.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000409000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000413000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.0000000000416000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000041F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000043E000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972607881.000000000046F000.00000004.00000001.01000000.00000004.sdmpDownload File
                            • Associated: 00000001.00000002.2972789889.000000000052B000.00000002.00000001.01000000.00000004.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_400000_Au_.jbxd
                            Similarity
                            • API ID: lstrlen$CharNextlstrcmpi
                            • String ID:
                            • API String ID: 190613189-0
                            • Opcode ID: 0108cf067d6f6d80c8ed850288af8a4b3b9133f156f8bdff26d83f0dd252fb59
                            • Instruction ID: 042c172281cf084eebf1820456e7eb749b121a10276c912c68532230cfd8689c
                            • Opcode Fuzzy Hash: 0108cf067d6f6d80c8ed850288af8a4b3b9133f156f8bdff26d83f0dd252fb59
                            • Instruction Fuzzy Hash: BBF0A736249D51DBC2029B295C44E6FBEA4EF95355F14057EF440F3180D335AC11ABBB